General
-
Target
2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker
-
Size
49KB
-
Sample
240228-s8kssafc89
-
MD5
74165336293e9062da1bd425e33eac69
-
SHA1
538ef3602f107dce7688a76e540b39e16f171769
-
SHA256
24b8232566f5ff90e1bc712a872d680369c3896d2195714460d790bd3932b167
-
SHA512
b911e3bfc68223845b7fd10dcf9abe655ee9f06758cc7dd155021d70dea429ac8a768bc63eaef6cd2cb2f866c818c534f102dd0f4c7737fc03f096759c971ecb
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52c:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uc
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker
-
Size
49KB
-
MD5
74165336293e9062da1bd425e33eac69
-
SHA1
538ef3602f107dce7688a76e540b39e16f171769
-
SHA256
24b8232566f5ff90e1bc712a872d680369c3896d2195714460d790bd3932b167
-
SHA512
b911e3bfc68223845b7fd10dcf9abe655ee9f06758cc7dd155021d70dea429ac8a768bc63eaef6cd2cb2f866c818c534f102dd0f4c7737fc03f096759c971ecb
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52c:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-