General
-
Target
2024-05-22_cb214613b51529f9f0367c8e7a8ea0dd_cryptolocker
-
Size
91KB
-
Sample
240522-2ga9psbe66
-
MD5
cb214613b51529f9f0367c8e7a8ea0dd
-
SHA1
a91cc05f127b7d6dea2fe2e42c32b362df1d49f0
-
SHA256
23a787bc7b94ce82de9f8b6bb5322ea739512ffee717e7216121e0e7d7900105
-
SHA512
69e2d066e940e32e2255ead3d93fcfc906e3f46de5273a3cd9a624693ce66c094bada42606ded7e93868d428df7b28ff7978a6e7b97c22ecc71835016e79f62a
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddE:AnBdOOtEvwDpj6zA
Behavioral task
behavioral1
Sample
2024-05-22_cb214613b51529f9f0367c8e7a8ea0dd_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_cb214613b51529f9f0367c8e7a8ea0dd_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_cb214613b51529f9f0367c8e7a8ea0dd_cryptolocker
-
Size
91KB
-
MD5
cb214613b51529f9f0367c8e7a8ea0dd
-
SHA1
a91cc05f127b7d6dea2fe2e42c32b362df1d49f0
-
SHA256
23a787bc7b94ce82de9f8b6bb5322ea739512ffee717e7216121e0e7d7900105
-
SHA512
69e2d066e940e32e2255ead3d93fcfc906e3f46de5273a3cd9a624693ce66c094bada42606ded7e93868d428df7b28ff7978a6e7b97c22ecc71835016e79f62a
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddE:AnBdOOtEvwDpj6zA
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-