General
-
Target
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker
-
Size
72KB
-
Sample
240315-3khnmafg73
-
MD5
627bfeca062bb5691fb9566f1a928eec
-
SHA1
dac277aa0b3801ec015dd1335d4069ea49b5a7e6
-
SHA256
4b1eba3c00dcf46b701789c31d56641a2fce8285316f43cbebaceb6fb83bdb53
-
SHA512
4b393283d47edd1e38b760075bcf849fd7feecb2148fa2fd3be52be86734256e0721f577fccd758d41bf17999407897931b8b618ceb13bb1cb1b721af4699237
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFQ:1nK6a+qdOOtEvwDpjS
Behavioral task
behavioral1
Sample
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker
-
Size
72KB
-
MD5
627bfeca062bb5691fb9566f1a928eec
-
SHA1
dac277aa0b3801ec015dd1335d4069ea49b5a7e6
-
SHA256
4b1eba3c00dcf46b701789c31d56641a2fce8285316f43cbebaceb6fb83bdb53
-
SHA512
4b393283d47edd1e38b760075bcf849fd7feecb2148fa2fd3be52be86734256e0721f577fccd758d41bf17999407897931b8b618ceb13bb1cb1b721af4699237
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFQ:1nK6a+qdOOtEvwDpjS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-