General
-
Target
2024-04-20_76a2397e4c2f85866067c54d2f04d73d_cryptolocker
-
Size
37KB
-
Sample
240420-pzl3psha64
-
MD5
76a2397e4c2f85866067c54d2f04d73d
-
SHA1
4eb9debec39ad4d8b9add344b20f6cc4c377db6d
-
SHA256
e28749c72b25dbe52d76a62a6949a8509e3c592f7a93973749997a26c55d5d61
-
SHA512
0c4a18d2e804273f1475ea36ca77dae9da3f472c1c3595374e1fc5797d98d4814641594cb7720232db07cb6107a222bf4f87f270a10c1758ed7d94a7b78c7901
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9K:qDdFJy3QMOtEvwDpjjWMl7Tx
Behavioral task
behavioral1
Sample
2024-04-20_76a2397e4c2f85866067c54d2f04d73d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_76a2397e4c2f85866067c54d2f04d73d_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-20_76a2397e4c2f85866067c54d2f04d73d_cryptolocker
-
Size
37KB
-
MD5
76a2397e4c2f85866067c54d2f04d73d
-
SHA1
4eb9debec39ad4d8b9add344b20f6cc4c377db6d
-
SHA256
e28749c72b25dbe52d76a62a6949a8509e3c592f7a93973749997a26c55d5d61
-
SHA512
0c4a18d2e804273f1475ea36ca77dae9da3f472c1c3595374e1fc5797d98d4814641594cb7720232db07cb6107a222bf4f87f270a10c1758ed7d94a7b78c7901
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9K:qDdFJy3QMOtEvwDpjjWMl7Tx
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-