General
-
Target
2024-02-28_a82390eac1422bd0a338e42874121557_cryptolocker
-
Size
100KB
-
Sample
240228-f1aavscb67
-
MD5
a82390eac1422bd0a338e42874121557
-
SHA1
6c52e6500f0066f729a11469395fcd7dd0d741f9
-
SHA256
ded08b3ad0245355ec581739e9487b7f6d32d46cbf01d9dcc98f230646a1134e
-
SHA512
6fe68d71d5f7c791ea0bf6396499d63a8110abdffb181eff44015007f4920107998fe5dbb61159d2095dce403ad1248bbdb575d6f22e34a11ee64171c3de276b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6o:AnBdOOtEvwDpj6z0
Behavioral task
behavioral1
Sample
2024-02-28_a82390eac1422bd0a338e42874121557_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-28_a82390eac1422bd0a338e42874121557_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_a82390eac1422bd0a338e42874121557_cryptolocker
-
Size
100KB
-
MD5
a82390eac1422bd0a338e42874121557
-
SHA1
6c52e6500f0066f729a11469395fcd7dd0d741f9
-
SHA256
ded08b3ad0245355ec581739e9487b7f6d32d46cbf01d9dcc98f230646a1134e
-
SHA512
6fe68d71d5f7c791ea0bf6396499d63a8110abdffb181eff44015007f4920107998fe5dbb61159d2095dce403ad1248bbdb575d6f22e34a11ee64171c3de276b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6o:AnBdOOtEvwDpj6z0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-