General
-
Target
2024-04-30_8da283528783da5a5da56f0bd0fd61a4_cryptolocker
-
Size
38KB
-
Sample
240430-2f8htahe2x
-
MD5
8da283528783da5a5da56f0bd0fd61a4
-
SHA1
b24ab314d5c8fc5ccab9246bed52d90908825e0c
-
SHA256
db861ad6756e40947d026135f35336bcb5573a5a7941c45b7e37d9a04367722a
-
SHA512
41e096a319419d9cc59af3389b68ce2cdc3c35ff6b16c7f22dd2f5be75aa8f6d44c4492575c6655a78afb86d1cd21088a8aca58b103333db44272d2b92738fe2
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8IujdxNH:b/yC4GyNM01GuQMNXw2PSj1Pqq8B1
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_8da283528783da5a5da56f0bd0fd61a4_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-30_8da283528783da5a5da56f0bd0fd61a4_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-30_8da283528783da5a5da56f0bd0fd61a4_cryptolocker
-
Size
38KB
-
MD5
8da283528783da5a5da56f0bd0fd61a4
-
SHA1
b24ab314d5c8fc5ccab9246bed52d90908825e0c
-
SHA256
db861ad6756e40947d026135f35336bcb5573a5a7941c45b7e37d9a04367722a
-
SHA512
41e096a319419d9cc59af3389b68ce2cdc3c35ff6b16c7f22dd2f5be75aa8f6d44c4492575c6655a78afb86d1cd21088a8aca58b103333db44272d2b92738fe2
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8IujdxNH:b/yC4GyNM01GuQMNXw2PSj1Pqq8B1
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-