General
-
Target
2024-03-15_9613263e89b0913f1b35ed283af73ff5_cryptolocker
-
Size
89KB
-
Sample
240315-g9mg8aaa5y
-
MD5
9613263e89b0913f1b35ed283af73ff5
-
SHA1
3df57cd2a022fe77e485cdd74a4071caea969133
-
SHA256
d5f148a36a5a2fb0097dffe00938ba9614b2e91a3813accf7fe9466eedda4f59
-
SHA512
21247b7b1812c5d9e6e1f40088b4eeabadaf9fa0ceabbd86c3ca01b575de11d6291f321c6fe550a727ffbe30261761206d3d16f5491d6b02c5248b8fd6ef700b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdPX:AnBdOOtEvwDpj6zZ
Behavioral task
behavioral1
Sample
2024-03-15_9613263e89b0913f1b35ed283af73ff5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_9613263e89b0913f1b35ed283af73ff5_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-15_9613263e89b0913f1b35ed283af73ff5_cryptolocker
-
Size
89KB
-
MD5
9613263e89b0913f1b35ed283af73ff5
-
SHA1
3df57cd2a022fe77e485cdd74a4071caea969133
-
SHA256
d5f148a36a5a2fb0097dffe00938ba9614b2e91a3813accf7fe9466eedda4f59
-
SHA512
21247b7b1812c5d9e6e1f40088b4eeabadaf9fa0ceabbd86c3ca01b575de11d6291f321c6fe550a727ffbe30261761206d3d16f5491d6b02c5248b8fd6ef700b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdPX:AnBdOOtEvwDpj6zZ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-