General
-
Target
2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker
-
Size
62KB
-
Sample
240318-vjhy1adf79
-
MD5
1c12d77959865d54d312af571faf13a9
-
SHA1
f042a44c7e79412b3c3548a10bf786fae4c6e618
-
SHA256
6321c9f69c66f919c41e422df884a8be5739520033e1d1219f4b912cb196a019
-
SHA512
b2a7c722c3890c9ffb63fbdfaa4dd786d5390fec922fc15f5b7eba5ae0906ce5f4e436c2df5444d98a3712b823a44f7523c1c9986f8f338ba6ae7069c57395ad
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6T:BbdDmjr+OtEvwDpjM8O
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker
-
Size
62KB
-
MD5
1c12d77959865d54d312af571faf13a9
-
SHA1
f042a44c7e79412b3c3548a10bf786fae4c6e618
-
SHA256
6321c9f69c66f919c41e422df884a8be5739520033e1d1219f4b912cb196a019
-
SHA512
b2a7c722c3890c9ffb63fbdfaa4dd786d5390fec922fc15f5b7eba5ae0906ce5f4e436c2df5444d98a3712b823a44f7523c1c9986f8f338ba6ae7069c57395ad
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6T:BbdDmjr+OtEvwDpjM8O
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-