General
-
Target
2024-02-28_368f4c51cbf38bd51c8c4b07620effa6_cryptolocker
-
Size
87KB
-
Sample
240228-nmemesae6t
-
MD5
368f4c51cbf38bd51c8c4b07620effa6
-
SHA1
6d804e61059b8ec4e2344237c8e049a053bc950d
-
SHA256
9ce7b570ff3c1c4d383bcb51b7d0393b51b1bd5ddba678aedfec2328c840979d
-
SHA512
7f8d1b2ec5621c687dbe3e11324bdf630040d1931997ffab5b5800fe8ed08371ef34030bd99f00e125b9a6fee34b68c1c255b74e0d4fcf7a524dc0436e20b852
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgLqX:AnBdOOtEvwDpj6z6
Behavioral task
behavioral1
Sample
2024-02-28_368f4c51cbf38bd51c8c4b07620effa6_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-28_368f4c51cbf38bd51c8c4b07620effa6_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_368f4c51cbf38bd51c8c4b07620effa6_cryptolocker
-
Size
87KB
-
MD5
368f4c51cbf38bd51c8c4b07620effa6
-
SHA1
6d804e61059b8ec4e2344237c8e049a053bc950d
-
SHA256
9ce7b570ff3c1c4d383bcb51b7d0393b51b1bd5ddba678aedfec2328c840979d
-
SHA512
7f8d1b2ec5621c687dbe3e11324bdf630040d1931997ffab5b5800fe8ed08371ef34030bd99f00e125b9a6fee34b68c1c255b74e0d4fcf7a524dc0436e20b852
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgLqX:AnBdOOtEvwDpj6z6
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-