General
-
Target
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker
-
Size
25KB
-
Sample
240612-nje4sawfll
-
MD5
022e872535aa9e63cc3581ab61ec70d2
-
SHA1
afcff7274f5a022e2783afa9ce3d9c7c57f16fd1
-
SHA256
5387cc193ecbd9a76163d9281cefd716005d9e1677dce504815b91e2692792c5
-
SHA512
0603ae671c75bf4c90e51227666b178dd03d4a01c88fe001f83b2e0415e74bc1853316b2fc22c1e9d2c304dc2b5dd52742dce28bdf8e20ffa4cc64860bfb1efa
-
SSDEEP
384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTE:bYOdVB2jXUrMkvnbcuyD7UFXOo
Behavioral task
behavioral1
Sample
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker
-
Size
25KB
-
MD5
022e872535aa9e63cc3581ab61ec70d2
-
SHA1
afcff7274f5a022e2783afa9ce3d9c7c57f16fd1
-
SHA256
5387cc193ecbd9a76163d9281cefd716005d9e1677dce504815b91e2692792c5
-
SHA512
0603ae671c75bf4c90e51227666b178dd03d4a01c88fe001f83b2e0415e74bc1853316b2fc22c1e9d2c304dc2b5dd52742dce28bdf8e20ffa4cc64860bfb1efa
-
SSDEEP
384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTE:bYOdVB2jXUrMkvnbcuyD7UFXOo
-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-