General
-
Target
2024-03-28_c0e42ec15f3798003ea6a5fe67b6a495_cryptolocker
-
Size
94KB
-
Sample
240328-szmk1saf62
-
MD5
c0e42ec15f3798003ea6a5fe67b6a495
-
SHA1
3eacd64c509f06c3f52172d90055594f0a5dae37
-
SHA256
dea18701649dc2d3da50985bca03e0a119fc10c0b405a6348948668b4bed7cd6
-
SHA512
1db50f3ff0aa6ff6a38a47cb8c46c11a6952bfdf574fa7d1f5eab50ff1bc7867660e95b3e1d4183e7e3595782eec2a8c6ffd3c5216fa037d08be627627ca1c08
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/+e:zCsanOtEvwDpjB/
Behavioral task
behavioral1
Sample
2024-03-28_c0e42ec15f3798003ea6a5fe67b6a495_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_c0e42ec15f3798003ea6a5fe67b6a495_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_c0e42ec15f3798003ea6a5fe67b6a495_cryptolocker
-
Size
94KB
-
MD5
c0e42ec15f3798003ea6a5fe67b6a495
-
SHA1
3eacd64c509f06c3f52172d90055594f0a5dae37
-
SHA256
dea18701649dc2d3da50985bca03e0a119fc10c0b405a6348948668b4bed7cd6
-
SHA512
1db50f3ff0aa6ff6a38a47cb8c46c11a6952bfdf574fa7d1f5eab50ff1bc7867660e95b3e1d4183e7e3595782eec2a8c6ffd3c5216fa037d08be627627ca1c08
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/+e:zCsanOtEvwDpjB/
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-