General
-
Target
2024-03-16_425069423a7cf0b751fa075e665338b8_cryptolocker
-
Size
47KB
-
Sample
240316-lprnnaac86
-
MD5
425069423a7cf0b751fa075e665338b8
-
SHA1
929b5c0407600925dff96384178ea86c0d6eb01b
-
SHA256
1e29e73c8861fa2b251562568a53cfdcee3344b3dcbc603a089d8657246491aa
-
SHA512
f65fed88fa2e55cf3feff7f6d9407fbdc2cddef106107c6a3a11bf8b53e6c37421990fa8aca8932bca9b09f8700eeb7e844f6f1c517b3f3bbd915299c67d3ca1
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB+Yu:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6+
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_425069423a7cf0b751fa075e665338b8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_425069423a7cf0b751fa075e665338b8_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-16_425069423a7cf0b751fa075e665338b8_cryptolocker
-
Size
47KB
-
MD5
425069423a7cf0b751fa075e665338b8
-
SHA1
929b5c0407600925dff96384178ea86c0d6eb01b
-
SHA256
1e29e73c8861fa2b251562568a53cfdcee3344b3dcbc603a089d8657246491aa
-
SHA512
f65fed88fa2e55cf3feff7f6d9407fbdc2cddef106107c6a3a11bf8b53e6c37421990fa8aca8932bca9b09f8700eeb7e844f6f1c517b3f3bbd915299c67d3ca1
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB+Yu:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-