General
-
Target
2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker
-
Size
66KB
-
Sample
240318-sw2wjace6x
-
MD5
23d04ef4900450de699b92db662452ff
-
SHA1
8402afb1e8a706bf556a85f4cf969ec8ef39e5d0
-
SHA256
6b1ec7961593c74e9ad40baf00355b243193ef6a6d779677c1a15b6be10a86c7
-
SHA512
33da6ef42f7eb48b0de883bca690996744396494654007ac50ae8cfb0dbc4f6e20ba36b76552926e3594387424d1349163a60419886b2761b9077dbe83b4a1d7
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1FU:T6a+rdOOtEvwDpjN0
Behavioral task
behavioral1
Sample
2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-18_23d04ef4900450de699b92db662452ff_cryptolocker
-
Size
66KB
-
MD5
23d04ef4900450de699b92db662452ff
-
SHA1
8402afb1e8a706bf556a85f4cf969ec8ef39e5d0
-
SHA256
6b1ec7961593c74e9ad40baf00355b243193ef6a6d779677c1a15b6be10a86c7
-
SHA512
33da6ef42f7eb48b0de883bca690996744396494654007ac50ae8cfb0dbc4f6e20ba36b76552926e3594387424d1349163a60419886b2761b9077dbe83b4a1d7
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1FU:T6a+rdOOtEvwDpjN0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-