General
-
Target
2024-03-11_2534f1a5c8c71903be37ceb1b607a088_cryptolocker
-
Size
79KB
-
Sample
240311-vzvbzahc7z
-
MD5
2534f1a5c8c71903be37ceb1b607a088
-
SHA1
6fc02d35da10e8b48b3d6e2f86750ca544934bfa
-
SHA256
b099bfa83ca0438b9a8367bcf3b105040d5df8316a7635f6edfe4d98df314178
-
SHA512
37488ae8298721c6da2c34787e573e4a5c48868fcc1730bc5c9c7caa886cf07ff5400b441727f7b90b8cb2ebf32f2d17fde00bdf2d522a5e6cec3813539da36a
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBM:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kym
Behavioral task
behavioral1
Sample
2024-03-11_2534f1a5c8c71903be37ceb1b607a088_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_2534f1a5c8c71903be37ceb1b607a088_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-11_2534f1a5c8c71903be37ceb1b607a088_cryptolocker
-
Size
79KB
-
MD5
2534f1a5c8c71903be37ceb1b607a088
-
SHA1
6fc02d35da10e8b48b3d6e2f86750ca544934bfa
-
SHA256
b099bfa83ca0438b9a8367bcf3b105040d5df8316a7635f6edfe4d98df314178
-
SHA512
37488ae8298721c6da2c34787e573e4a5c48868fcc1730bc5c9c7caa886cf07ff5400b441727f7b90b8cb2ebf32f2d17fde00bdf2d522a5e6cec3813539da36a
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBM:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kym
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-