General
-
Target
2024-04-06_25d714b8f62492901d1039874cbb6269_cryptolocker
-
Size
31KB
-
Sample
240406-d3ex1shg91
-
MD5
25d714b8f62492901d1039874cbb6269
-
SHA1
c79969c2e039305561742f9c887fe8aad42c3a22
-
SHA256
16143f5b559d44350d9477f8a801f4649ee7ca9f77d6763e91db90d1ab049fbb
-
SHA512
0c4f925d11896453c325c02488ecfd0e2a81c00bd5b2d201350ceb0b9569a2a5801f6a421d29c1b178d688252f8ea1ebd4c013af1155001ac14317d94d1f3699
-
SSDEEP
768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtC:bFPmpiif/oc+vC
Behavioral task
behavioral1
Sample
2024-04-06_25d714b8f62492901d1039874cbb6269_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_25d714b8f62492901d1039874cbb6269_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-06_25d714b8f62492901d1039874cbb6269_cryptolocker
-
Size
31KB
-
MD5
25d714b8f62492901d1039874cbb6269
-
SHA1
c79969c2e039305561742f9c887fe8aad42c3a22
-
SHA256
16143f5b559d44350d9477f8a801f4649ee7ca9f77d6763e91db90d1ab049fbb
-
SHA512
0c4f925d11896453c325c02488ecfd0e2a81c00bd5b2d201350ceb0b9569a2a5801f6a421d29c1b178d688252f8ea1ebd4c013af1155001ac14317d94d1f3699
-
SSDEEP
768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtC:bFPmpiif/oc+vC
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-