General
-
Target
2024-04-16_1d69347b6ccd8b34b052c4c3ace5773e_cryptolocker
-
Size
89KB
-
Sample
240416-rs27fsdh3t
-
MD5
1d69347b6ccd8b34b052c4c3ace5773e
-
SHA1
157813423ed3a2344cd4153dcd324498029cc32f
-
SHA256
51e22185ac065dcb9ff3d1a2b50baae5c4d4157215690774e2574c52ebe56cf5
-
SHA512
29b820e65e9d39110f47ff9fb04fba7eb8db0ca39d4cdeb3927d020dec7d308b3ee7cba5925860ef3b38b6acde013bf6d2a9a44fcca636be5fc582a312417b68
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddB:AnBdOOtEvwDpj6z1
Behavioral task
behavioral1
Sample
2024-04-16_1d69347b6ccd8b34b052c4c3ace5773e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_1d69347b6ccd8b34b052c4c3ace5773e_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-16_1d69347b6ccd8b34b052c4c3ace5773e_cryptolocker
-
Size
89KB
-
MD5
1d69347b6ccd8b34b052c4c3ace5773e
-
SHA1
157813423ed3a2344cd4153dcd324498029cc32f
-
SHA256
51e22185ac065dcb9ff3d1a2b50baae5c4d4157215690774e2574c52ebe56cf5
-
SHA512
29b820e65e9d39110f47ff9fb04fba7eb8db0ca39d4cdeb3927d020dec7d308b3ee7cba5925860ef3b38b6acde013bf6d2a9a44fcca636be5fc582a312417b68
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddB:AnBdOOtEvwDpj6z1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-