General
-
Target
2024-03-09_55d4ed835c29f56dc37009df97bb15cb_cryptolocker
-
Size
125KB
-
Sample
240309-e7kvhadf3x
-
MD5
55d4ed835c29f56dc37009df97bb15cb
-
SHA1
a42983db48ace2546ee5b4c5c0973abda551eba6
-
SHA256
a1d038088c98f140badd3b27e646bc2add19521ea421fd7ab02910cfc2750da8
-
SHA512
7bc9c1de3f3dc29f2baf0ac3985c5b43303e892951ec99c7e0688243ffcc24e6050554b8b0730669773a4c7fa3d18a9cbaab4ae932c04042512f86478f797b4a
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e0Y:AnBdOOtEvwDpj6zj
Behavioral task
behavioral1
Sample
2024-03-09_55d4ed835c29f56dc37009df97bb15cb_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_55d4ed835c29f56dc37009df97bb15cb_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-09_55d4ed835c29f56dc37009df97bb15cb_cryptolocker
-
Size
125KB
-
MD5
55d4ed835c29f56dc37009df97bb15cb
-
SHA1
a42983db48ace2546ee5b4c5c0973abda551eba6
-
SHA256
a1d038088c98f140badd3b27e646bc2add19521ea421fd7ab02910cfc2750da8
-
SHA512
7bc9c1de3f3dc29f2baf0ac3985c5b43303e892951ec99c7e0688243ffcc24e6050554b8b0730669773a4c7fa3d18a9cbaab4ae932c04042512f86478f797b4a
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e0Y:AnBdOOtEvwDpj6zj
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-