General
-
Target
2024-03-16_1f90906a66f82a48eeb9294c5f1ffecf_cryptolocker
-
Size
98KB
-
Sample
240316-mgke2sba87
-
MD5
1f90906a66f82a48eeb9294c5f1ffecf
-
SHA1
fce161ad208eb00fa4039173f4b4b807375b6cf7
-
SHA256
d8990851ee6c9b9c35d68c7c73e0605065f7d10f0d22d8c116ef0115f9fbb0f4
-
SHA512
9a15720049a1ceca93089f19c277c0a7a4c309720582d9ecfd4eb770144ea30be97cb6f8e8f7904f26e2d923cdfa910b0ceefe2b0e6b207c50bec5094fae0a21
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiJ:z6a+CdOOtEvwDpjct
Behavioral task
behavioral1
Sample
2024-03-16_1f90906a66f82a48eeb9294c5f1ffecf_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_1f90906a66f82a48eeb9294c5f1ffecf_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-16_1f90906a66f82a48eeb9294c5f1ffecf_cryptolocker
-
Size
98KB
-
MD5
1f90906a66f82a48eeb9294c5f1ffecf
-
SHA1
fce161ad208eb00fa4039173f4b4b807375b6cf7
-
SHA256
d8990851ee6c9b9c35d68c7c73e0605065f7d10f0d22d8c116ef0115f9fbb0f4
-
SHA512
9a15720049a1ceca93089f19c277c0a7a4c309720582d9ecfd4eb770144ea30be97cb6f8e8f7904f26e2d923cdfa910b0ceefe2b0e6b207c50bec5094fae0a21
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiJ:z6a+CdOOtEvwDpjct
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-