General
-
Target
2024-03-25_c23f52c3541cd0eac5d6803880d76ce9_cryptolocker
-
Size
35KB
-
Sample
240325-yp5lqsgf53
-
MD5
c23f52c3541cd0eac5d6803880d76ce9
-
SHA1
70cfa1323b93aa7914cd9f4b85fffd3a0efa5e53
-
SHA256
6a1e815eb8b672d1601a5fbe15ca9300e9b22c2098c2414429b50ebd35ea02b3
-
SHA512
148638e7841eb0d9aea2fde4ed5dead19af855c68ba1cab7887f7f7ae70105b877edec2cfd85c22d9f07a4147bf9777f25be6eaec41d8dc70f4961ea3cfd1533
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/Dpk9:qDdFJy3QMOtEvwDpjjWMl6
Behavioral task
behavioral1
Sample
2024-03-25_c23f52c3541cd0eac5d6803880d76ce9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_c23f52c3541cd0eac5d6803880d76ce9_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-25_c23f52c3541cd0eac5d6803880d76ce9_cryptolocker
-
Size
35KB
-
MD5
c23f52c3541cd0eac5d6803880d76ce9
-
SHA1
70cfa1323b93aa7914cd9f4b85fffd3a0efa5e53
-
SHA256
6a1e815eb8b672d1601a5fbe15ca9300e9b22c2098c2414429b50ebd35ea02b3
-
SHA512
148638e7841eb0d9aea2fde4ed5dead19af855c68ba1cab7887f7f7ae70105b877edec2cfd85c22d9f07a4147bf9777f25be6eaec41d8dc70f4961ea3cfd1533
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/Dpk9:qDdFJy3QMOtEvwDpjjWMl6
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-