General
-
Target
2024-04-09_3a12207d316d9b290059869d0a229b21_cryptolocker
-
Size
87KB
-
Sample
240409-d8et7sha4x
-
MD5
3a12207d316d9b290059869d0a229b21
-
SHA1
7ded94c31441d735a5ec47b83a4705ee3948f8d2
-
SHA256
2114b37db04bab5990a632bf2194ec5d842e28eae3f8c3b1fa706b6f6276e2e9
-
SHA512
c125a210ff25f6bf35f829eb36cfaa45a2d54dccfe296cc9442b8ee679c8260a3e91825ab30e72efdc06e9b2a5c0905e20c17b0e3e100cb9fadce6c5e4f4fd02
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIJ/k:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg1
Behavioral task
behavioral1
Sample
2024-04-09_3a12207d316d9b290059869d0a229b21_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_3a12207d316d9b290059869d0a229b21_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-09_3a12207d316d9b290059869d0a229b21_cryptolocker
-
Size
87KB
-
MD5
3a12207d316d9b290059869d0a229b21
-
SHA1
7ded94c31441d735a5ec47b83a4705ee3948f8d2
-
SHA256
2114b37db04bab5990a632bf2194ec5d842e28eae3f8c3b1fa706b6f6276e2e9
-
SHA512
c125a210ff25f6bf35f829eb36cfaa45a2d54dccfe296cc9442b8ee679c8260a3e91825ab30e72efdc06e9b2a5c0905e20c17b0e3e100cb9fadce6c5e4f4fd02
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIJ/k:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-