General
-
Target
2024-03-09_1728f97f81a13921a3e7c21e72ce1f04_cryptolocker
-
Size
87KB
-
Sample
240309-w416rafd2w
-
MD5
1728f97f81a13921a3e7c21e72ce1f04
-
SHA1
5f52175c94de37fc0164359ac0cf1aaf176e4e3c
-
SHA256
8465aeb8624f466e0e368e594993ba4a7129e883da53ed60230ed7716518ebe0
-
SHA512
30119cd4794c4d830387ac492aee60177cf6c74e3cd1e98b00148826142b5071986e9e9ada5c0d8eb312785b523fc4ab6d1166c4dc5609b25ce316d53cf0fe8a
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIJ/u:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgT
Behavioral task
behavioral1
Sample
2024-03-09_1728f97f81a13921a3e7c21e72ce1f04_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_1728f97f81a13921a3e7c21e72ce1f04_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-09_1728f97f81a13921a3e7c21e72ce1f04_cryptolocker
-
Size
87KB
-
MD5
1728f97f81a13921a3e7c21e72ce1f04
-
SHA1
5f52175c94de37fc0164359ac0cf1aaf176e4e3c
-
SHA256
8465aeb8624f466e0e368e594993ba4a7129e883da53ed60230ed7716518ebe0
-
SHA512
30119cd4794c4d830387ac492aee60177cf6c74e3cd1e98b00148826142b5071986e9e9ada5c0d8eb312785b523fc4ab6d1166c4dc5609b25ce316d53cf0fe8a
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIJ/u:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgT
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-