General
-
Target
2024-03-18_1c4838eddedbada5ff0db04685b12c36_cryptolocker
-
Size
80KB
-
Sample
240318-z9npdsba71
-
MD5
1c4838eddedbada5ff0db04685b12c36
-
SHA1
52cb5fc6db6ca71c527cae5736688e3972dcd8a9
-
SHA256
8aa0ac24743e423e0647477a5d793169d43ad5c64c7e6d0563462baa50d58478
-
SHA512
39eb65a86417c28d71f8c1515b5835d3103064aa58d8e1d5234b52725ed5a1698f0baf20e17358e805dde242d0a196b7c687de84a4fe2d99bf4cc8599b61a3a6
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1Y:zCsanOtEvwDpj+
Behavioral task
behavioral1
Sample
2024-03-18_1c4838eddedbada5ff0db04685b12c36_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-18_1c4838eddedbada5ff0db04685b12c36_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-18_1c4838eddedbada5ff0db04685b12c36_cryptolocker
-
Size
80KB
-
MD5
1c4838eddedbada5ff0db04685b12c36
-
SHA1
52cb5fc6db6ca71c527cae5736688e3972dcd8a9
-
SHA256
8aa0ac24743e423e0647477a5d793169d43ad5c64c7e6d0563462baa50d58478
-
SHA512
39eb65a86417c28d71f8c1515b5835d3103064aa58d8e1d5234b52725ed5a1698f0baf20e17358e805dde242d0a196b7c687de84a4fe2d99bf4cc8599b61a3a6
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1Y:zCsanOtEvwDpj+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-