General
-
Target
2024-02-28_34ae84d050a6402e8564031d3e3cd61b_cryptolocker
-
Size
70KB
-
Sample
240228-t3whrsgd91
-
MD5
34ae84d050a6402e8564031d3e3cd61b
-
SHA1
a9a90e70c098a2910aa36ff8a132e6e36cecb524
-
SHA256
6219a13855edc6c29882ca9cad13936878255531af26211e6587ffc32fe17038
-
SHA512
a2b7f9162e4a69427a279b6076c37f00c16961a43f798ca370a3e90e974f941d43134ef792b581d27132f0a581acac97a90f38604722638389d45266ee57cfa6
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBH:z6a+CdOOtEvwDpjQF
Behavioral task
behavioral1
Sample
2024-02-28_34ae84d050a6402e8564031d3e3cd61b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_34ae84d050a6402e8564031d3e3cd61b_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_34ae84d050a6402e8564031d3e3cd61b_cryptolocker
-
Size
70KB
-
MD5
34ae84d050a6402e8564031d3e3cd61b
-
SHA1
a9a90e70c098a2910aa36ff8a132e6e36cecb524
-
SHA256
6219a13855edc6c29882ca9cad13936878255531af26211e6587ffc32fe17038
-
SHA512
a2b7f9162e4a69427a279b6076c37f00c16961a43f798ca370a3e90e974f941d43134ef792b581d27132f0a581acac97a90f38604722638389d45266ee57cfa6
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBH:z6a+CdOOtEvwDpjQF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-