General
-
Target
2024-02-25_7fd51094914bee3aaeb06432e8f64c14_cryptolocker
-
Size
99KB
-
Sample
240225-mjzbzshf26
-
MD5
7fd51094914bee3aaeb06432e8f64c14
-
SHA1
a5c7b3664341d3bdbd677c848bc17429d17212c4
-
SHA256
ba84ce45d8cda0723e495cde96d5da8855f6b1c68d87b2879d8e63b83c032919
-
SHA512
f9ad964160dd35ff246902b78d7f5f789389c7df05fc4fe88c51ef8ed7cfb2daa2b762389f8e7a3c3c9c0fa3f23b237ec55b5f52263e37a7fe2896fdf2d035eb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBe:AnBdOOtEvwDpj6zF
Behavioral task
behavioral1
Sample
2024-02-25_7fd51094914bee3aaeb06432e8f64c14_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_7fd51094914bee3aaeb06432e8f64c14_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-25_7fd51094914bee3aaeb06432e8f64c14_cryptolocker
-
Size
99KB
-
MD5
7fd51094914bee3aaeb06432e8f64c14
-
SHA1
a5c7b3664341d3bdbd677c848bc17429d17212c4
-
SHA256
ba84ce45d8cda0723e495cde96d5da8855f6b1c68d87b2879d8e63b83c032919
-
SHA512
f9ad964160dd35ff246902b78d7f5f789389c7df05fc4fe88c51ef8ed7cfb2daa2b762389f8e7a3c3c9c0fa3f23b237ec55b5f52263e37a7fe2896fdf2d035eb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBe:AnBdOOtEvwDpj6zF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-