General
-
Target
2024-02-25_94bd79678664ab411e3c61ba1e2109ba_cryptolocker
-
Size
98KB
-
Sample
240225-qycnbadg3t
-
MD5
94bd79678664ab411e3c61ba1e2109ba
-
SHA1
6de19fb90d3eeb7a1ede89688a2d1d7d69cd0559
-
SHA256
787574b60b7d205127df09b5f11eac9d420883db6a93d17309a0f59ebe34354f
-
SHA512
722716b155efb3a619221b4373f407e92ea4765d11ae1fbd97fc51ce7ed9919d3bb40eefb90f7a51d7a9de18b195b403815edcf8326c146788f377d67da6d88c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPGF2+:AnBdOOtEvwDpj6zP+
Behavioral task
behavioral1
Sample
2024-02-25_94bd79678664ab411e3c61ba1e2109ba_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_94bd79678664ab411e3c61ba1e2109ba_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-25_94bd79678664ab411e3c61ba1e2109ba_cryptolocker
-
Size
98KB
-
MD5
94bd79678664ab411e3c61ba1e2109ba
-
SHA1
6de19fb90d3eeb7a1ede89688a2d1d7d69cd0559
-
SHA256
787574b60b7d205127df09b5f11eac9d420883db6a93d17309a0f59ebe34354f
-
SHA512
722716b155efb3a619221b4373f407e92ea4765d11ae1fbd97fc51ce7ed9919d3bb40eefb90f7a51d7a9de18b195b403815edcf8326c146788f377d67da6d88c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPGF2+:AnBdOOtEvwDpj6zP+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-