General
-
Target
2024-03-06_c5c07924cdeb9ebfc73f9cc52c73ada1_cryptolocker
-
Size
81KB
-
Sample
240306-cde12sfg81
-
MD5
c5c07924cdeb9ebfc73f9cc52c73ada1
-
SHA1
22400e1bb324abd0eb5a1b714178c92e243f397e
-
SHA256
9e2b31e563ee3f8631a61d27b79fb96ed7ece55774e01628a56b83c39df341fe
-
SHA512
370f06f2631e1fa2c71a563271a5c830578d42e5184dc12e323d45fd8d0d2771ed252e2777acf506ca3b5f3e946c1e5de9b307f26dd0a6673d674f70792cbf2d
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fA:zCsanOtEvwDpje
Behavioral task
behavioral1
Sample
2024-03-06_c5c07924cdeb9ebfc73f9cc52c73ada1_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_c5c07924cdeb9ebfc73f9cc52c73ada1_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-06_c5c07924cdeb9ebfc73f9cc52c73ada1_cryptolocker
-
Size
81KB
-
MD5
c5c07924cdeb9ebfc73f9cc52c73ada1
-
SHA1
22400e1bb324abd0eb5a1b714178c92e243f397e
-
SHA256
9e2b31e563ee3f8631a61d27b79fb96ed7ece55774e01628a56b83c39df341fe
-
SHA512
370f06f2631e1fa2c71a563271a5c830578d42e5184dc12e323d45fd8d0d2771ed252e2777acf506ca3b5f3e946c1e5de9b307f26dd0a6673d674f70792cbf2d
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fA:zCsanOtEvwDpje
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-