General
-
Target
2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker
-
Size
115KB
-
Sample
240313-gejsvaea7v
-
MD5
670f1049cac50787a52968e92246cd4b
-
SHA1
3c8d59b1ef3abcad9097ba904d7b40ededef77d6
-
SHA256
38fbf89bf07e1f4ea2ea330019d39d8c7a2de84828f289de9aa1939fea0e8695
-
SHA512
9d889389bb3c381b0c0e960ada6ccd6bbc917ca7b466d1d862f6c745b45e8f8b7830896995ab18d268636829caf6e980b3cc8c0d06059d1f8c770908316890e9
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar//f:T6a+rdOOtEvwDpjLzi
Behavioral task
behavioral1
Sample
2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-13_670f1049cac50787a52968e92246cd4b_cryptolocker
-
Size
115KB
-
MD5
670f1049cac50787a52968e92246cd4b
-
SHA1
3c8d59b1ef3abcad9097ba904d7b40ededef77d6
-
SHA256
38fbf89bf07e1f4ea2ea330019d39d8c7a2de84828f289de9aa1939fea0e8695
-
SHA512
9d889389bb3c381b0c0e960ada6ccd6bbc917ca7b466d1d862f6c745b45e8f8b7830896995ab18d268636829caf6e980b3cc8c0d06059d1f8c770908316890e9
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar//f:T6a+rdOOtEvwDpjLzi
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-