General
-
Target
2024-03-08_e1c098db672411444e4abbef951585f8_cryptolocker
-
Size
88KB
-
Sample
240308-dpp6tsdh86
-
MD5
e1c098db672411444e4abbef951585f8
-
SHA1
2b1532b232f479dfb326a08d2e19698794b14b40
-
SHA256
9d642d8fe55190405dfc1147e49c4ea0a8ed628ab657c16e31154e8bb86014c9
-
SHA512
f896dbe701c083109965b598e1cc2a27c2eefa91df89f0c45b8bc259688ad706880d1ecda7db2f1d8ac7ce30a37b7a98d6af867247d5b74b68dda668a6cbb7a4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghA:AnBdOOtEvwDpj6zu
Behavioral task
behavioral1
Sample
2024-03-08_e1c098db672411444e4abbef951585f8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_e1c098db672411444e4abbef951585f8_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-08_e1c098db672411444e4abbef951585f8_cryptolocker
-
Size
88KB
-
MD5
e1c098db672411444e4abbef951585f8
-
SHA1
2b1532b232f479dfb326a08d2e19698794b14b40
-
SHA256
9d642d8fe55190405dfc1147e49c4ea0a8ed628ab657c16e31154e8bb86014c9
-
SHA512
f896dbe701c083109965b598e1cc2a27c2eefa91df89f0c45b8bc259688ad706880d1ecda7db2f1d8ac7ce30a37b7a98d6af867247d5b74b68dda668a6cbb7a4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghA:AnBdOOtEvwDpj6zu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-