General
-
Target
2024-03-25_53ec1f5b0c3b4b72b3d4094074d63b6a_cryptolocker
-
Size
85KB
-
Sample
240325-t1szvsfg21
-
MD5
53ec1f5b0c3b4b72b3d4094074d63b6a
-
SHA1
0edbfa9f4553e6668d674d743d18c0ee1bd42af0
-
SHA256
25b7eca1fceba3717eabba6411bc574c0b92cde48d925a6326577456d8681954
-
SHA512
1eb9acc9bf56ef4e1a2b22a0acb729110d526e4b50b318dc7b2bcea5001a546746ecb2bac8d2885d37f8477ec27d94c13cda256a9e0637e0274840643aa3a149
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgBW:AnBdOOtEvwDpj6zY
Behavioral task
behavioral1
Sample
2024-03-25_53ec1f5b0c3b4b72b3d4094074d63b6a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_53ec1f5b0c3b4b72b3d4094074d63b6a_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-25_53ec1f5b0c3b4b72b3d4094074d63b6a_cryptolocker
-
Size
85KB
-
MD5
53ec1f5b0c3b4b72b3d4094074d63b6a
-
SHA1
0edbfa9f4553e6668d674d743d18c0ee1bd42af0
-
SHA256
25b7eca1fceba3717eabba6411bc574c0b92cde48d925a6326577456d8681954
-
SHA512
1eb9acc9bf56ef4e1a2b22a0acb729110d526e4b50b318dc7b2bcea5001a546746ecb2bac8d2885d37f8477ec27d94c13cda256a9e0637e0274840643aa3a149
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgBW:AnBdOOtEvwDpj6zY
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-