General
-
Target
2024-03-11_e40ec8e6606f9e556621251ea4a91f05_cryptolocker
-
Size
108KB
-
Sample
240311-1gh4wafa81
-
MD5
e40ec8e6606f9e556621251ea4a91f05
-
SHA1
3a746cc9bcd0e1c6ad8ec4bd65d9715d63a38b84
-
SHA256
f69a7465654d966d32c834609c8f44975b42d6d8dc145323fc85ef9076daf00c
-
SHA512
d7ae9578e7b3d32cf4a7660d61132c2c21403a241be0c12e2bae7214ebeb56ac117055da89aeb0e4736050fd8d849c88999a1c359b2d9d359a30f5ede188e20f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkszfE:1nK6a+qdOOtEvwDpjQ
Behavioral task
behavioral1
Sample
2024-03-11_e40ec8e6606f9e556621251ea4a91f05_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-11_e40ec8e6606f9e556621251ea4a91f05_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-11_e40ec8e6606f9e556621251ea4a91f05_cryptolocker
-
Size
108KB
-
MD5
e40ec8e6606f9e556621251ea4a91f05
-
SHA1
3a746cc9bcd0e1c6ad8ec4bd65d9715d63a38b84
-
SHA256
f69a7465654d966d32c834609c8f44975b42d6d8dc145323fc85ef9076daf00c
-
SHA512
d7ae9578e7b3d32cf4a7660d61132c2c21403a241be0c12e2bae7214ebeb56ac117055da89aeb0e4736050fd8d849c88999a1c359b2d9d359a30f5ede188e20f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkszfE:1nK6a+qdOOtEvwDpjQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-