General
-
Target
2024-03-05_a407be6b66479016535b4e09a015415a_cryptolocker
-
Size
109KB
-
Sample
240305-grttksgb5y
-
MD5
a407be6b66479016535b4e09a015415a
-
SHA1
40e03d9a23a2f2becfeabbcd0566494e885c8b6e
-
SHA256
3d8905e43dd1eb31012cf50f9988ac2c49b88c25d5263c29a5438632deb9bf24
-
SHA512
72fd82ec77d41565d45dd653cb1f1aa0aba237aa62c030f5b8f656bfda9f0829c8e12018ee613e20057c010812ac5317321f89ee3677360db1379692598fcdf0
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMghJOH:z6a+CdOOtEvwDpjczK
Behavioral task
behavioral1
Sample
2024-03-05_a407be6b66479016535b4e09a015415a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_a407be6b66479016535b4e09a015415a_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-05_a407be6b66479016535b4e09a015415a_cryptolocker
-
Size
109KB
-
MD5
a407be6b66479016535b4e09a015415a
-
SHA1
40e03d9a23a2f2becfeabbcd0566494e885c8b6e
-
SHA256
3d8905e43dd1eb31012cf50f9988ac2c49b88c25d5263c29a5438632deb9bf24
-
SHA512
72fd82ec77d41565d45dd653cb1f1aa0aba237aa62c030f5b8f656bfda9f0829c8e12018ee613e20057c010812ac5317321f89ee3677360db1379692598fcdf0
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMghJOH:z6a+CdOOtEvwDpjczK
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-