General
-
Target
2024-05-14_189a4e32b59b53584af03d9bf3831714_cryptolocker
-
Size
43KB
-
Sample
240514-y6b1rafc69
-
MD5
189a4e32b59b53584af03d9bf3831714
-
SHA1
077785e98dff2211548e5d1a68ceb83a95b2807a
-
SHA256
2b22ed6168bbdecaf7fcb9c12ef9460ec65e7a6df7841e101ab89eb1ab647f0b
-
SHA512
ed7bd5788825b0ffd909c776265ed78eb2cb6901d5ba9d9569b2ead3a263dd3c72a2a3cfca4ea43e111430274999d5b0762882add8c03241c0100e8f85250208
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAFR:b/pYayGig5HjS3NPAFR
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_189a4e32b59b53584af03d9bf3831714_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-14_189a4e32b59b53584af03d9bf3831714_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-14_189a4e32b59b53584af03d9bf3831714_cryptolocker
-
Size
43KB
-
MD5
189a4e32b59b53584af03d9bf3831714
-
SHA1
077785e98dff2211548e5d1a68ceb83a95b2807a
-
SHA256
2b22ed6168bbdecaf7fcb9c12ef9460ec65e7a6df7841e101ab89eb1ab647f0b
-
SHA512
ed7bd5788825b0ffd909c776265ed78eb2cb6901d5ba9d9569b2ead3a263dd3c72a2a3cfca4ea43e111430274999d5b0762882add8c03241c0100e8f85250208
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAFR:b/pYayGig5HjS3NPAFR
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-