General
-
Target
2024-04-25_ac8ed09338db9e683225a8a9f939e141_cryptolocker
-
Size
96KB
-
Sample
240425-fefwhsfg3z
-
MD5
ac8ed09338db9e683225a8a9f939e141
-
SHA1
f2897a7b3520ecce5a74ae816315190518e98e7c
-
SHA256
a827d9a3833d6e11a41481eb782eee86fb4571cad17dcbde81ec70fc3ab2974d
-
SHA512
882c9d19cff9ffd3e1c25da9a41a8634b0c3878d441991fede42e66c242db1b96d4b3b442f929676684f96e550960b1372bef5e9817d8b9d37e44441b1c7c3d8
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy9H:AnBdOOtEvwDpj6z+
Behavioral task
behavioral1
Sample
2024-04-25_ac8ed09338db9e683225a8a9f939e141_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-25_ac8ed09338db9e683225a8a9f939e141_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-25_ac8ed09338db9e683225a8a9f939e141_cryptolocker
-
Size
96KB
-
MD5
ac8ed09338db9e683225a8a9f939e141
-
SHA1
f2897a7b3520ecce5a74ae816315190518e98e7c
-
SHA256
a827d9a3833d6e11a41481eb782eee86fb4571cad17dcbde81ec70fc3ab2974d
-
SHA512
882c9d19cff9ffd3e1c25da9a41a8634b0c3878d441991fede42e66c242db1b96d4b3b442f929676684f96e550960b1372bef5e9817d8b9d37e44441b1c7c3d8
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy9H:AnBdOOtEvwDpj6z+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-