General
-
Target
2024-03-14_1b6dd98a25d076f0e105c0d8933edcdb_cryptolocker
-
Size
108KB
-
Sample
240314-nk5qtsag41
-
MD5
1b6dd98a25d076f0e105c0d8933edcdb
-
SHA1
2ff6c59d948e01963d6cc4dd6bc8d091c31edbf9
-
SHA256
9969aef72014ec59b178e94dd1f62c546dfb2d01461f2aa4ce18187461833de2
-
SHA512
86b40fa7d53158d74864552b1de060444896d98d43dcc8d86ef35e4772b704d5ed6ad17983e3992eec96214d2ffd61f1225a6753c11fc87a7d89c3c06c99345b
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfl:1nK6a+qdOOtEvwDpjR
Behavioral task
behavioral1
Sample
2024-03-14_1b6dd98a25d076f0e105c0d8933edcdb_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-14_1b6dd98a25d076f0e105c0d8933edcdb_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-14_1b6dd98a25d076f0e105c0d8933edcdb_cryptolocker
-
Size
108KB
-
MD5
1b6dd98a25d076f0e105c0d8933edcdb
-
SHA1
2ff6c59d948e01963d6cc4dd6bc8d091c31edbf9
-
SHA256
9969aef72014ec59b178e94dd1f62c546dfb2d01461f2aa4ce18187461833de2
-
SHA512
86b40fa7d53158d74864552b1de060444896d98d43dcc8d86ef35e4772b704d5ed6ad17983e3992eec96214d2ffd61f1225a6753c11fc87a7d89c3c06c99345b
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfl:1nK6a+qdOOtEvwDpjR
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-