General
-
Target
2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker
-
Size
94KB
-
Sample
240327-d8m6ksbh58
-
MD5
4c845c8b812233154c7d36857b23f19c
-
SHA1
7784b3f2713e162607f85cca619b744b5b3e8c8f
-
SHA256
4750c3653c7667cb4bca80551648a41a916f861c737e5424f03e7a063813d66d
-
SHA512
812f7f9d621e7784719fd4b7097bfbae9856f44eb3346e0226c85560dbca46de10b0a17f840c97fad2a2d527b6f01ff502341d159706e5312f630f1e1348ceda
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bL:zCsanOtEvwDpjBP
Behavioral task
behavioral1
Sample
2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-27_4c845c8b812233154c7d36857b23f19c_cryptolocker
-
Size
94KB
-
MD5
4c845c8b812233154c7d36857b23f19c
-
SHA1
7784b3f2713e162607f85cca619b744b5b3e8c8f
-
SHA256
4750c3653c7667cb4bca80551648a41a916f861c737e5424f03e7a063813d66d
-
SHA512
812f7f9d621e7784719fd4b7097bfbae9856f44eb3346e0226c85560dbca46de10b0a17f840c97fad2a2d527b6f01ff502341d159706e5312f630f1e1348ceda
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bL:zCsanOtEvwDpjBP
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-