General
-
Target
2024-03-25_74547209efff3249b75bf95e40592cbc_cryptolocker
-
Size
31KB
-
Sample
240325-rs1nmaag22
-
MD5
74547209efff3249b75bf95e40592cbc
-
SHA1
5bd42485a64a9444dac0068372a811e0c2e9905c
-
SHA256
cfc7343cb335c4d8332cfe68122b8b7902a97cc7f4cfb942a0211090f6298fc4
-
SHA512
38f0aaea9466418cb105d5cb1c3d175b08759762e3190e768179f8933e1bd8f81e860d4a4eba66982f153f67a02dc9157435757a41765ba49d4360ada03ff309
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xOcsT4:q0zizzOSxMOtEvwDpj/arMHT4
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_74547209efff3249b75bf95e40592cbc_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-25_74547209efff3249b75bf95e40592cbc_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-25_74547209efff3249b75bf95e40592cbc_cryptolocker
-
Size
31KB
-
MD5
74547209efff3249b75bf95e40592cbc
-
SHA1
5bd42485a64a9444dac0068372a811e0c2e9905c
-
SHA256
cfc7343cb335c4d8332cfe68122b8b7902a97cc7f4cfb942a0211090f6298fc4
-
SHA512
38f0aaea9466418cb105d5cb1c3d175b08759762e3190e768179f8933e1bd8f81e860d4a4eba66982f153f67a02dc9157435757a41765ba49d4360ada03ff309
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xOcsT4:q0zizzOSxMOtEvwDpj/arMHT4
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-