General
-
Target
2024-04-21_24d193b97da1bd4cb905a642088c8afa_cryptolocker
-
Size
89KB
-
Sample
240421-e4k14abb93
-
MD5
24d193b97da1bd4cb905a642088c8afa
-
SHA1
af1935faf4a7ea8998592cca69f068c4154b1b78
-
SHA256
750f62429b8923a69894941e532ac0c9d3b44afc6b9d5271171d0d8b08920af7
-
SHA512
9800807b9c9926ea5dfaf26c83194af77c17281975acadf064b7f78d1dda93a1fe59e88ebe39a9321b0d9c7cb4e8c52cab05751505898d7bac3380e08c48d62a
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAy:n6a+1SEOtEvwDpjYYvQd2Px
Behavioral task
behavioral1
Sample
2024-04-21_24d193b97da1bd4cb905a642088c8afa_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_24d193b97da1bd4cb905a642088c8afa_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-21_24d193b97da1bd4cb905a642088c8afa_cryptolocker
-
Size
89KB
-
MD5
24d193b97da1bd4cb905a642088c8afa
-
SHA1
af1935faf4a7ea8998592cca69f068c4154b1b78
-
SHA256
750f62429b8923a69894941e532ac0c9d3b44afc6b9d5271171d0d8b08920af7
-
SHA512
9800807b9c9926ea5dfaf26c83194af77c17281975acadf064b7f78d1dda93a1fe59e88ebe39a9321b0d9c7cb4e8c52cab05751505898d7bac3380e08c48d62a
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAy:n6a+1SEOtEvwDpjYYvQd2Px
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-