General
-
Target
2024-03-05_4a66de633e33458a37a71fbf1a12f57c_cryptolocker
-
Size
80KB
-
Sample
240305-gcefcage74
-
MD5
4a66de633e33458a37a71fbf1a12f57c
-
SHA1
e0b58d991dd5642c39f6fb16914812f52847e83e
-
SHA256
b1d2342dff929dd97152771e7a616ee058bd83788fe9328d74e9460d41afeb16
-
SHA512
ee3ca6e14d23137a4150534ec01d8a6935a62925b2bcc9bb753dbc589fa42a1a4e405c367e0464600759401f958a7e9aea61b27e4ed481c157eef8c0b07b3b07
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2Kr:zCsanOtEvwDpjY
Behavioral task
behavioral1
Sample
2024-03-05_4a66de633e33458a37a71fbf1a12f57c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_4a66de633e33458a37a71fbf1a12f57c_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-05_4a66de633e33458a37a71fbf1a12f57c_cryptolocker
-
Size
80KB
-
MD5
4a66de633e33458a37a71fbf1a12f57c
-
SHA1
e0b58d991dd5642c39f6fb16914812f52847e83e
-
SHA256
b1d2342dff929dd97152771e7a616ee058bd83788fe9328d74e9460d41afeb16
-
SHA512
ee3ca6e14d23137a4150534ec01d8a6935a62925b2bcc9bb753dbc589fa42a1a4e405c367e0464600759401f958a7e9aea61b27e4ed481c157eef8c0b07b3b07
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2Kr:zCsanOtEvwDpjY
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-