General
-
Target
2024-03-08_2d8efeeebe0309e24863f29a1d63fa80_cryptolocker
-
Size
47KB
-
Sample
240308-c1ec2aeb3t
-
MD5
2d8efeeebe0309e24863f29a1d63fa80
-
SHA1
fa85c887cf47c021649274bf21aadd5bee49119c
-
SHA256
5a851ffac5c6388267534711f9f097791cee65496ab545526d53343da690accd
-
SHA512
318e50c9c360cab0df001f221d15566c0e4f5c5972a55b3447ce0ca7ab44558325e728118b2d1098adbc903ce05448cfe4f8c991933de20b60db078905c33d66
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo220:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJ7o
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_2d8efeeebe0309e24863f29a1d63fa80_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_2d8efeeebe0309e24863f29a1d63fa80_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-08_2d8efeeebe0309e24863f29a1d63fa80_cryptolocker
-
Size
47KB
-
MD5
2d8efeeebe0309e24863f29a1d63fa80
-
SHA1
fa85c887cf47c021649274bf21aadd5bee49119c
-
SHA256
5a851ffac5c6388267534711f9f097791cee65496ab545526d53343da690accd
-
SHA512
318e50c9c360cab0df001f221d15566c0e4f5c5972a55b3447ce0ca7ab44558325e728118b2d1098adbc903ce05448cfe4f8c991933de20b60db078905c33d66
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo220:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJ7o
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-