General
-
Target
2024-03-27_f7babfc3a7fcf063391af26f18c20c3b_cryptolocker
-
Size
82KB
-
Sample
240327-weamhacf7y
-
MD5
f7babfc3a7fcf063391af26f18c20c3b
-
SHA1
c830acdba51a0cac5819a93d0ee34b89bb1bd11c
-
SHA256
2e6c7d504fa09f15fbe1ee2bbc26d5a1e44597ce1d3c0b320fb1e07fc8a59b4e
-
SHA512
a7ecf4a2b5fa613986d2f4750aa655fb14a8b76daee4ffb25f4c8a24ab04672d2857257a2d8b3a6d87278ee93eeae0a675f267496576c855c47665fef54fceaf
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT76:T6a+rdOOtEvwDpjNu
Behavioral task
behavioral1
Sample
2024-03-27_f7babfc3a7fcf063391af26f18c20c3b_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-27_f7babfc3a7fcf063391af26f18c20c3b_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-27_f7babfc3a7fcf063391af26f18c20c3b_cryptolocker
-
Size
82KB
-
MD5
f7babfc3a7fcf063391af26f18c20c3b
-
SHA1
c830acdba51a0cac5819a93d0ee34b89bb1bd11c
-
SHA256
2e6c7d504fa09f15fbe1ee2bbc26d5a1e44597ce1d3c0b320fb1e07fc8a59b4e
-
SHA512
a7ecf4a2b5fa613986d2f4750aa655fb14a8b76daee4ffb25f4c8a24ab04672d2857257a2d8b3a6d87278ee93eeae0a675f267496576c855c47665fef54fceaf
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT76:T6a+rdOOtEvwDpjNu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-