General
-
Target
2024-05-11_f2126cba365066c6f727dd17bcac1f5f_cryptolocker
-
Size
90KB
-
Sample
240511-f1ewcaab99
-
MD5
f2126cba365066c6f727dd17bcac1f5f
-
SHA1
73c8cc383e4a9dcc659cb47a8ea0c84857699095
-
SHA256
9c7888f890821723562cc9b2607871b76038579b89c21b681e1da5483d59e4fb
-
SHA512
e369110230c49de96ccd38e77edddcf59585c852c129586ba7aaab0fb5015bdb86dee2888a01f7b1f4526e723864a8e2963375db426dd1dcfa17aff2e5991b06
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIr:AnBdOOtEvwDpj6z2
Behavioral task
behavioral1
Sample
2024-05-11_f2126cba365066c6f727dd17bcac1f5f_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-11_f2126cba365066c6f727dd17bcac1f5f_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-11_f2126cba365066c6f727dd17bcac1f5f_cryptolocker
-
Size
90KB
-
MD5
f2126cba365066c6f727dd17bcac1f5f
-
SHA1
73c8cc383e4a9dcc659cb47a8ea0c84857699095
-
SHA256
9c7888f890821723562cc9b2607871b76038579b89c21b681e1da5483d59e4fb
-
SHA512
e369110230c49de96ccd38e77edddcf59585c852c129586ba7aaab0fb5015bdb86dee2888a01f7b1f4526e723864a8e2963375db426dd1dcfa17aff2e5991b06
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIr:AnBdOOtEvwDpj6z2
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-