General
-
Target
2024-03-20_18fb9c687eb96fe322d98b8cf494aedf_cryptolocker
-
Size
87KB
-
Sample
240320-artegscd6z
-
MD5
18fb9c687eb96fe322d98b8cf494aedf
-
SHA1
538a7483c388f971ad88365e0155ee4acfc32207
-
SHA256
12d132c7253f96e4342555872b8d6267b5e79217fcb45d2c452ac17ddd7b5766
-
SHA512
3e548a287083d9d8ffcec2bb10789ae19300cf7719140cf6683ee3b7e2257827f0429d8a748aa7bf3c3083049a87d12770c984458b3cca72f7351c925ddf1601
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEz:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgq
Behavioral task
behavioral1
Sample
2024-03-20_18fb9c687eb96fe322d98b8cf494aedf_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-20_18fb9c687eb96fe322d98b8cf494aedf_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-20_18fb9c687eb96fe322d98b8cf494aedf_cryptolocker
-
Size
87KB
-
MD5
18fb9c687eb96fe322d98b8cf494aedf
-
SHA1
538a7483c388f971ad88365e0155ee4acfc32207
-
SHA256
12d132c7253f96e4342555872b8d6267b5e79217fcb45d2c452ac17ddd7b5766
-
SHA512
3e548a287083d9d8ffcec2bb10789ae19300cf7719140cf6683ee3b7e2257827f0429d8a748aa7bf3c3083049a87d12770c984458b3cca72f7351c925ddf1601
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEz:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgq
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-