General
-
Target
2024-03-09_dae1b0d5085dc00707d6aa7204e8aab1_cryptolocker
-
Size
62KB
-
Sample
240309-fl3c4ach74
-
MD5
dae1b0d5085dc00707d6aa7204e8aab1
-
SHA1
3e4bf05a4bd2d16fb28658610cd6aabd1c482c75
-
SHA256
d465af2ff6f1765256950e192cbb04ea158820d8f1481f97ef185feb40e58e3d
-
SHA512
b9dc09b007ace01171362779c6dfb5f44f60da396b4ccff146b1ac14247bff602a993a8aaf0267802fb2c1de3799fdb288b8aeebf953ae1a1e2ee0b1e348a3e6
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts7:BbdDmjr+OtEvwDpjM8j
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_dae1b0d5085dc00707d6aa7204e8aab1_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_dae1b0d5085dc00707d6aa7204e8aab1_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-09_dae1b0d5085dc00707d6aa7204e8aab1_cryptolocker
-
Size
62KB
-
MD5
dae1b0d5085dc00707d6aa7204e8aab1
-
SHA1
3e4bf05a4bd2d16fb28658610cd6aabd1c482c75
-
SHA256
d465af2ff6f1765256950e192cbb04ea158820d8f1481f97ef185feb40e58e3d
-
SHA512
b9dc09b007ace01171362779c6dfb5f44f60da396b4ccff146b1ac14247bff602a993a8aaf0267802fb2c1de3799fdb288b8aeebf953ae1a1e2ee0b1e348a3e6
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts7:BbdDmjr+OtEvwDpjM8j
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-