General
-
Target
2024-03-26_101622887efedb5dc0c1f86022ec07a9_cryptolocker
-
Size
100KB
-
Sample
240326-g7v2ksgd6z
-
MD5
101622887efedb5dc0c1f86022ec07a9
-
SHA1
ade51e796bfb6ab3e70d9a2c3421ac3282b6c975
-
SHA256
f2b1e047fdb62f148bb72593ce14a003dee33fa6cba04b18f66f0e85ecd6fc86
-
SHA512
3e27a51192895ff08a29958c8ddc7ff133cd0c874d84802eddc524500c45f0ed301ba8ae660b2d848379c9a808651fc93370fb6a911008c20a0c9f931fc24bd5
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPy/:AnBdOOtEvwDpj6zk
Behavioral task
behavioral1
Sample
2024-03-26_101622887efedb5dc0c1f86022ec07a9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_101622887efedb5dc0c1f86022ec07a9_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-26_101622887efedb5dc0c1f86022ec07a9_cryptolocker
-
Size
100KB
-
MD5
101622887efedb5dc0c1f86022ec07a9
-
SHA1
ade51e796bfb6ab3e70d9a2c3421ac3282b6c975
-
SHA256
f2b1e047fdb62f148bb72593ce14a003dee33fa6cba04b18f66f0e85ecd6fc86
-
SHA512
3e27a51192895ff08a29958c8ddc7ff133cd0c874d84802eddc524500c45f0ed301ba8ae660b2d848379c9a808651fc93370fb6a911008c20a0c9f931fc24bd5
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPy/:AnBdOOtEvwDpj6zk
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-