General
-
Target
2024-03-06_fe7245fa6ae5ea84fb2afb633dbfe590_cryptolocker
-
Size
92KB
-
Sample
240306-1ytlyabg41
-
MD5
fe7245fa6ae5ea84fb2afb633dbfe590
-
SHA1
96caff8fbed3019fa8c69f0f1e7801d94a62b112
-
SHA256
a7299dd4c1c7cd65a413c3c0d10bf729ee1826a74d9ae159d7e2ec60d26fdc41
-
SHA512
ac71b5667c2adc21e75788253d696f7f0a72bf0c8dbf339660754b222c50cc9aa0734445f7a4c43440bedfa97f275c5bf759fc00cb7ddb59d960229620f4daa5
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87UvTL:zCsanOtEvwDpjC
Behavioral task
behavioral1
Sample
2024-03-06_fe7245fa6ae5ea84fb2afb633dbfe590_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_fe7245fa6ae5ea84fb2afb633dbfe590_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-06_fe7245fa6ae5ea84fb2afb633dbfe590_cryptolocker
-
Size
92KB
-
MD5
fe7245fa6ae5ea84fb2afb633dbfe590
-
SHA1
96caff8fbed3019fa8c69f0f1e7801d94a62b112
-
SHA256
a7299dd4c1c7cd65a413c3c0d10bf729ee1826a74d9ae159d7e2ec60d26fdc41
-
SHA512
ac71b5667c2adc21e75788253d696f7f0a72bf0c8dbf339660754b222c50cc9aa0734445f7a4c43440bedfa97f275c5bf759fc00cb7ddb59d960229620f4daa5
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87UvTL:zCsanOtEvwDpjC
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-