General
-
Target
2024-02-28_3a09aa164ac5e2ecae079f170e6d49fc_cryptolocker
-
Size
68KB
-
Sample
240228-gxfh5sda69
-
MD5
3a09aa164ac5e2ecae079f170e6d49fc
-
SHA1
4d93ce4069fe8b44f366a8d28414ef7848b4e48e
-
SHA256
2d7f75667e181cd750445c565c3481686b89c61275b51e8610624bc7f998ef7d
-
SHA512
d2f335af72e78bbe5d144a89e5c3c18845a3694c3e48e06088c5551d39dcc785d0f7bc4f6f56c27bbe000618764defb2e5d7f12d623e8e16efaa62b13abcaed1
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBT:z6a+CdOOtEvwDpjQB
Behavioral task
behavioral1
Sample
2024-02-28_3a09aa164ac5e2ecae079f170e6d49fc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_3a09aa164ac5e2ecae079f170e6d49fc_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_3a09aa164ac5e2ecae079f170e6d49fc_cryptolocker
-
Size
68KB
-
MD5
3a09aa164ac5e2ecae079f170e6d49fc
-
SHA1
4d93ce4069fe8b44f366a8d28414ef7848b4e48e
-
SHA256
2d7f75667e181cd750445c565c3481686b89c61275b51e8610624bc7f998ef7d
-
SHA512
d2f335af72e78bbe5d144a89e5c3c18845a3694c3e48e06088c5551d39dcc785d0f7bc4f6f56c27bbe000618764defb2e5d7f12d623e8e16efaa62b13abcaed1
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBT:z6a+CdOOtEvwDpjQB
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-