General
-
Target
2024-03-14_a5784ae3f3f0da038cc90e355d57be75_cryptolocker
-
Size
57KB
-
Sample
240314-gltxdscb3x
-
MD5
a5784ae3f3f0da038cc90e355d57be75
-
SHA1
0f4c06538782d54319e56c4865a997c7b3085f8d
-
SHA256
de4a3ea033e196c9ddeecd7d5a92dd2fd4967b207dce39a81cf75eb9b963ecd3
-
SHA512
edde0cd1622b85d2aa171abd00a9b0a389d10cb225de872d5639fd4ab71d25739553d8dc710d49dc5c261fe6996ffe7b556843e25a79c61faca2d2bfced2c315
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appr:z6QFElP6n+gKmddpMOtEvwDpj9aYa7
Behavioral task
behavioral1
Sample
2024-03-14_a5784ae3f3f0da038cc90e355d57be75_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_a5784ae3f3f0da038cc90e355d57be75_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-14_a5784ae3f3f0da038cc90e355d57be75_cryptolocker
-
Size
57KB
-
MD5
a5784ae3f3f0da038cc90e355d57be75
-
SHA1
0f4c06538782d54319e56c4865a997c7b3085f8d
-
SHA256
de4a3ea033e196c9ddeecd7d5a92dd2fd4967b207dce39a81cf75eb9b963ecd3
-
SHA512
edde0cd1622b85d2aa171abd00a9b0a389d10cb225de872d5639fd4ab71d25739553d8dc710d49dc5c261fe6996ffe7b556843e25a79c61faca2d2bfced2c315
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appr:z6QFElP6n+gKmddpMOtEvwDpj9aYa7
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-