General
-
Target
2024-03-05_90c5e5c1886ba914b6fe140af8f6146b_cryptolocker
-
Size
34KB
-
Sample
240305-yef6dsfd7s
-
MD5
90c5e5c1886ba914b6fe140af8f6146b
-
SHA1
803e36241ac87b99b1ff6831ef2efd89cf7abff6
-
SHA256
7e826f87864a2280549e058321520f0fd96411b9e4a1e07e5c99a0a274cbb033
-
SHA512
68c0174c62a15e051cd2daa28892be18161075d52bcb0b7b07be98ad352141348d2240f66dd295b9d9c8b99b7bb736f75a4b94da64595f7cf99d43b694911138
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axKuiO:qUmnpomddpMOtEvwDpjjaYadT
Behavioral task
behavioral1
Sample
2024-03-05_90c5e5c1886ba914b6fe140af8f6146b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_90c5e5c1886ba914b6fe140af8f6146b_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-05_90c5e5c1886ba914b6fe140af8f6146b_cryptolocker
-
Size
34KB
-
MD5
90c5e5c1886ba914b6fe140af8f6146b
-
SHA1
803e36241ac87b99b1ff6831ef2efd89cf7abff6
-
SHA256
7e826f87864a2280549e058321520f0fd96411b9e4a1e07e5c99a0a274cbb033
-
SHA512
68c0174c62a15e051cd2daa28892be18161075d52bcb0b7b07be98ad352141348d2240f66dd295b9d9c8b99b7bb736f75a4b94da64595f7cf99d43b694911138
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axKuiO:qUmnpomddpMOtEvwDpjjaYadT
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-