General
-
Target
2024-04-24_f783ef5c0e3585efff10a6590ca1cf79_cryptolocker
-
Size
42KB
-
Sample
240424-jdcz1sfg5v
-
MD5
f783ef5c0e3585efff10a6590ca1cf79
-
SHA1
f7ed40c707b6d1e915bceaf9130465b249c589e8
-
SHA256
60f71dac266aac344b5e383345180522bbdff49a90469d1c945bb1eb913b2fba
-
SHA512
ed628b3f44f2932bb4e9b631961b94910ba2857dd1e998b6803d924efddec61edb03180e3f5adcf04f7a669b170871748aad8d7cba30d212aead25e3afc09dec
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAN:b/pYayGig5HjS3NPAN
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_f783ef5c0e3585efff10a6590ca1cf79_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-24_f783ef5c0e3585efff10a6590ca1cf79_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-24_f783ef5c0e3585efff10a6590ca1cf79_cryptolocker
-
Size
42KB
-
MD5
f783ef5c0e3585efff10a6590ca1cf79
-
SHA1
f7ed40c707b6d1e915bceaf9130465b249c589e8
-
SHA256
60f71dac266aac344b5e383345180522bbdff49a90469d1c945bb1eb913b2fba
-
SHA512
ed628b3f44f2932bb4e9b631961b94910ba2857dd1e998b6803d924efddec61edb03180e3f5adcf04f7a669b170871748aad8d7cba30d212aead25e3afc09dec
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAN:b/pYayGig5HjS3NPAN
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-