General
-
Target
2024-03-11_943d856826738152aa7872d143ae8779_cryptolocker
-
Size
35KB
-
Sample
240311-a9en2sgc2z
-
MD5
943d856826738152aa7872d143ae8779
-
SHA1
599fb8a4e25e53d1413041799d0933e497a5bfdb
-
SHA256
187863b21209376faf8f170ca14308f227e8c3b324dd96dbd3c9a6882911869e
-
SHA512
ad3f70313936c1408276b012fee05a2bc67075eb86a21a46774cab653ea2c1c2b1d6ed30a7b9a778d06fe3859dc39f1d28a9d7d5fca8597cf41b1bec4d2199cc
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+s:qUmnpomddpMOtEvwDpjjaYaJ
Behavioral task
behavioral1
Sample
2024-03-11_943d856826738152aa7872d143ae8779_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-11_943d856826738152aa7872d143ae8779_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-11_943d856826738152aa7872d143ae8779_cryptolocker
-
Size
35KB
-
MD5
943d856826738152aa7872d143ae8779
-
SHA1
599fb8a4e25e53d1413041799d0933e497a5bfdb
-
SHA256
187863b21209376faf8f170ca14308f227e8c3b324dd96dbd3c9a6882911869e
-
SHA512
ad3f70313936c1408276b012fee05a2bc67075eb86a21a46774cab653ea2c1c2b1d6ed30a7b9a778d06fe3859dc39f1d28a9d7d5fca8597cf41b1bec4d2199cc
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+s:qUmnpomddpMOtEvwDpjjaYaJ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-