General
-
Target
2024-03-28_b022c6940f73455c1e6e091b472abdfe_cryptolocker
-
Size
64KB
-
Sample
240328-fgqthaed3v
-
MD5
b022c6940f73455c1e6e091b472abdfe
-
SHA1
10e8bc17aacf674310d1a4718e650c6383fd2b44
-
SHA256
fceca2d658bbbe21f33793edf0ff4bc09eb28523e7e1cc40e9a4380d9f2882e4
-
SHA512
269d3d3f98a6d5192e3b390ff76589ca91d4fe7e254a5551f5d9f0dae3989f62555d76a89e8a6d9c8c7e08dfed03e6c6fdce648061492eff2ec683f35eaa4469
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1J:T6a+rdOOtEvwDpjNr
Behavioral task
behavioral1
Sample
2024-03-28_b022c6940f73455c1e6e091b472abdfe_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_b022c6940f73455c1e6e091b472abdfe_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_b022c6940f73455c1e6e091b472abdfe_cryptolocker
-
Size
64KB
-
MD5
b022c6940f73455c1e6e091b472abdfe
-
SHA1
10e8bc17aacf674310d1a4718e650c6383fd2b44
-
SHA256
fceca2d658bbbe21f33793edf0ff4bc09eb28523e7e1cc40e9a4380d9f2882e4
-
SHA512
269d3d3f98a6d5192e3b390ff76589ca91d4fe7e254a5551f5d9f0dae3989f62555d76a89e8a6d9c8c7e08dfed03e6c6fdce648061492eff2ec683f35eaa4469
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1J:T6a+rdOOtEvwDpjNr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-