General
-
Target
2024-03-15_83b9eb84fbf6d54062e6fd8a1db9c586_cryptolocker
-
Size
49KB
-
Sample
240315-v7dn7age62
-
MD5
83b9eb84fbf6d54062e6fd8a1db9c586
-
SHA1
2c04b11bf4d1ba02eda7699988eb5fd7c8aff773
-
SHA256
e366ed2af69809f73a7b3cfb386b826c77a6b4e4d77a47b77490581df19f2726
-
SHA512
d916ec12f94e545bab7b33d68f4266648e4f1fb0e00f6af8c8cd1c1916876e0b0804d4e3c6eb015a6377adf35012c1c8fd7ff425f4af3fe639f91debd56060ca
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvbO:BbdDmjr+OtEvwDpjMXX
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_83b9eb84fbf6d54062e6fd8a1db9c586_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_83b9eb84fbf6d54062e6fd8a1db9c586_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-15_83b9eb84fbf6d54062e6fd8a1db9c586_cryptolocker
-
Size
49KB
-
MD5
83b9eb84fbf6d54062e6fd8a1db9c586
-
SHA1
2c04b11bf4d1ba02eda7699988eb5fd7c8aff773
-
SHA256
e366ed2af69809f73a7b3cfb386b826c77a6b4e4d77a47b77490581df19f2726
-
SHA512
d916ec12f94e545bab7b33d68f4266648e4f1fb0e00f6af8c8cd1c1916876e0b0804d4e3c6eb015a6377adf35012c1c8fd7ff425f4af3fe639f91debd56060ca
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvbO:BbdDmjr+OtEvwDpjMXX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-