General
-
Target
2024-02-28_1dd96435f53278c8e3c6fc162dcc4ad7_cryptolocker
-
Size
42KB
-
Sample
240228-mjf6eahd49
-
MD5
1dd96435f53278c8e3c6fc162dcc4ad7
-
SHA1
f0d8c0cfcdd2cb8a33367ad5012919d93104f06b
-
SHA256
255bd4489d40e0b2b74e5bb410672be143d7d3a47c0908d1324c7d3a15cd8ac9
-
SHA512
ea10a2ba9a6d61f65b3c4397a6c1f5680fc8096bc19ce64dc31111337c68c7b95ac2b531cf72d1a6d601162c443d0fd6ff261c62d2b32293ebb0d4666221773e
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PADk:b/pYayGig5HjS3NPA4
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_1dd96435f53278c8e3c6fc162dcc4ad7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_1dd96435f53278c8e3c6fc162dcc4ad7_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_1dd96435f53278c8e3c6fc162dcc4ad7_cryptolocker
-
Size
42KB
-
MD5
1dd96435f53278c8e3c6fc162dcc4ad7
-
SHA1
f0d8c0cfcdd2cb8a33367ad5012919d93104f06b
-
SHA256
255bd4489d40e0b2b74e5bb410672be143d7d3a47c0908d1324c7d3a15cd8ac9
-
SHA512
ea10a2ba9a6d61f65b3c4397a6c1f5680fc8096bc19ce64dc31111337c68c7b95ac2b531cf72d1a6d601162c443d0fd6ff261c62d2b32293ebb0d4666221773e
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PADk:b/pYayGig5HjS3NPA4
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-