General
-
Target
2024-03-13_ed36e793a0f9db9ab2e85cfcae4d373c_cryptolocker
-
Size
78KB
-
Sample
240313-gsz2zsee3t
-
MD5
ed36e793a0f9db9ab2e85cfcae4d373c
-
SHA1
6c804e7b1ee126311018f0ebf26a903949d18c31
-
SHA256
105d935ce12d23bd9baba53d33ffb4fec482ffbea28a47d1c1b9dafdf36d06db
-
SHA512
e30f720e7db7c26cf49cc642c3487698971a8d33d4cc174a0cc9943cda3ef0f3e44712d007485f06c8d9d653165c739ab0b19a354071b1b1122e1f36b436d8dd
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf7N:vCjsIOtEvwDpj5H9YvQd2l
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_ed36e793a0f9db9ab2e85cfcae4d373c_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-13_ed36e793a0f9db9ab2e85cfcae4d373c_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-13_ed36e793a0f9db9ab2e85cfcae4d373c_cryptolocker
-
Size
78KB
-
MD5
ed36e793a0f9db9ab2e85cfcae4d373c
-
SHA1
6c804e7b1ee126311018f0ebf26a903949d18c31
-
SHA256
105d935ce12d23bd9baba53d33ffb4fec482ffbea28a47d1c1b9dafdf36d06db
-
SHA512
e30f720e7db7c26cf49cc642c3487698971a8d33d4cc174a0cc9943cda3ef0f3e44712d007485f06c8d9d653165c739ab0b19a354071b1b1122e1f36b436d8dd
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf7N:vCjsIOtEvwDpj5H9YvQd2l
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-