General
-
Target
2024-03-12_0bff7aa312de64e25ffd1091adfe44ef_cryptolocker
-
Size
102KB
-
Sample
240312-3c151aea6v
-
MD5
0bff7aa312de64e25ffd1091adfe44ef
-
SHA1
9394480d9b4bc0e705cb7d09c104a87760f79a7f
-
SHA256
758301a892cd2f251302612f5c2601ba152fd032bccd12d868fbc813cacd6292
-
SHA512
d2034bd3e1640154e2250657881931d67c6ed2b7550ee344ceff3b82123a0ba3667ceeb0bd8fa7d00f85430bc6af14586c0c4ac1ddf5cfd824b02ef4636d6695
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6E:AnBdOOtEvwDpj6z4
Behavioral task
behavioral1
Sample
2024-03-12_0bff7aa312de64e25ffd1091adfe44ef_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_0bff7aa312de64e25ffd1091adfe44ef_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-12_0bff7aa312de64e25ffd1091adfe44ef_cryptolocker
-
Size
102KB
-
MD5
0bff7aa312de64e25ffd1091adfe44ef
-
SHA1
9394480d9b4bc0e705cb7d09c104a87760f79a7f
-
SHA256
758301a892cd2f251302612f5c2601ba152fd032bccd12d868fbc813cacd6292
-
SHA512
d2034bd3e1640154e2250657881931d67c6ed2b7550ee344ceff3b82123a0ba3667ceeb0bd8fa7d00f85430bc6af14586c0c4ac1ddf5cfd824b02ef4636d6695
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6E:AnBdOOtEvwDpj6z4
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-