General
-
Target
2024-03-11_d5d6ccc5244b709c8bc189873248101d_cryptolocker
-
Size
63KB
-
Sample
240311-b1dk3ahc6v
-
MD5
d5d6ccc5244b709c8bc189873248101d
-
SHA1
613b0827d3d8c0c6a6e8ae447b406a013b2b4ce0
-
SHA256
a9e9deb6d949e0697b3e65e3321e38209a5c6c02b488109cb337fc3a3ee1dde3
-
SHA512
3201a25212749add75e4f7dd9cbf89e09e4baefcfa5ac1583adbf833b0bf1f8f0259a527e046a94922d3e775aab1637105371be5bbf1c4c6a956d77cd6b77647
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVzCBRb:zj+soPSMOtEvwDpj4kpmeLmnZ+
Behavioral task
behavioral1
Sample
2024-03-11_d5d6ccc5244b709c8bc189873248101d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_d5d6ccc5244b709c8bc189873248101d_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-11_d5d6ccc5244b709c8bc189873248101d_cryptolocker
-
Size
63KB
-
MD5
d5d6ccc5244b709c8bc189873248101d
-
SHA1
613b0827d3d8c0c6a6e8ae447b406a013b2b4ce0
-
SHA256
a9e9deb6d949e0697b3e65e3321e38209a5c6c02b488109cb337fc3a3ee1dde3
-
SHA512
3201a25212749add75e4f7dd9cbf89e09e4baefcfa5ac1583adbf833b0bf1f8f0259a527e046a94922d3e775aab1637105371be5bbf1c4c6a956d77cd6b77647
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVzCBRb:zj+soPSMOtEvwDpj4kpmeLmnZ+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-