General
-
Target
2024-03-27_2a14d5e99040b29ee134510565e5ca37_cryptolocker
-
Size
127KB
-
Sample
240327-bwanlshb25
-
MD5
2a14d5e99040b29ee134510565e5ca37
-
SHA1
9a4dd56f34635f98eba56360f4cd46a51ead5e43
-
SHA256
8889e2c67a18e42d7374f8f0e4801f4874ee0e5c862e49742d047209e678fecc
-
SHA512
7a1ba083d450074cffbcba2d5ce6166705979d0bb73bfdeb1ac952bf0fb17a46e6954e79d6214fda1fd19f77f134cde19933b451c90dbeb8e398f86cc9ff84b1
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ebb:AnBdOOtEvwDpj6zN
Behavioral task
behavioral1
Sample
2024-03-27_2a14d5e99040b29ee134510565e5ca37_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-27_2a14d5e99040b29ee134510565e5ca37_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-27_2a14d5e99040b29ee134510565e5ca37_cryptolocker
-
Size
127KB
-
MD5
2a14d5e99040b29ee134510565e5ca37
-
SHA1
9a4dd56f34635f98eba56360f4cd46a51ead5e43
-
SHA256
8889e2c67a18e42d7374f8f0e4801f4874ee0e5c862e49742d047209e678fecc
-
SHA512
7a1ba083d450074cffbcba2d5ce6166705979d0bb73bfdeb1ac952bf0fb17a46e6954e79d6214fda1fd19f77f134cde19933b451c90dbeb8e398f86cc9ff84b1
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ebb:AnBdOOtEvwDpj6zN
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-