General
-
Target
2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker
-
Size
27KB
-
Sample
240428-n3hc9afd7t
-
MD5
fab11d14df33cfd72ac71943b0f71b01
-
SHA1
d1739cf23b64469fa90ccbabc6961b089af61b50
-
SHA256
82d0832a3524ace8fdbe936f61a01061cb270731ef28ea791c5e19f751e037fe
-
SHA512
59e6bab614494a49146db1644274583fb3f28aafa6cecb3f27fcc6da1ea8141a143a9298a749b178a10793dbd4a474c8791c1aa7c0e4c9917fa8bbba0d262888
-
SSDEEP
384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqe:q0ZziOWwULueOSdE8tOOtEvwDpjeYe
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker
-
Size
27KB
-
MD5
fab11d14df33cfd72ac71943b0f71b01
-
SHA1
d1739cf23b64469fa90ccbabc6961b089af61b50
-
SHA256
82d0832a3524ace8fdbe936f61a01061cb270731ef28ea791c5e19f751e037fe
-
SHA512
59e6bab614494a49146db1644274583fb3f28aafa6cecb3f27fcc6da1ea8141a143a9298a749b178a10793dbd4a474c8791c1aa7c0e4c9917fa8bbba0d262888
-
SSDEEP
384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqe:q0ZziOWwULueOSdE8tOOtEvwDpjeYe
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-