General
-
Target
2024-02-27_9c1193ff324432fbb96a1161c72fce37_cryptolocker
-
Size
75KB
-
Sample
240227-s854qadc8z
-
MD5
9c1193ff324432fbb96a1161c72fce37
-
SHA1
68449254d0fe75680c8b8239f3129ae24fd21d56
-
SHA256
c38986dfdda1264b1d84371404eeeecbb5c459691be6bb42645be4958c477945
-
SHA512
bdee43a0ccf1554dbeb00b8e190a13f571044231047270b1510049576ea0dd9d2687d9a1e24402c094f3f3052dec72b48f1799ce361f4883e63525259a7becc8
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJca:T6a+rdOOtEvwDpjNt9
Behavioral task
behavioral1
Sample
2024-02-27_9c1193ff324432fbb96a1161c72fce37_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-27_9c1193ff324432fbb96a1161c72fce37_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-27_9c1193ff324432fbb96a1161c72fce37_cryptolocker
-
Size
75KB
-
MD5
9c1193ff324432fbb96a1161c72fce37
-
SHA1
68449254d0fe75680c8b8239f3129ae24fd21d56
-
SHA256
c38986dfdda1264b1d84371404eeeecbb5c459691be6bb42645be4958c477945
-
SHA512
bdee43a0ccf1554dbeb00b8e190a13f571044231047270b1510049576ea0dd9d2687d9a1e24402c094f3f3052dec72b48f1799ce361f4883e63525259a7becc8
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJca:T6a+rdOOtEvwDpjNt9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-