General
-
Target
2024-06-12_872729afaa41c52ed35877c92a89f39c_cryptolocker
-
Size
42KB
-
Sample
240612-wfz9jstflc
-
MD5
872729afaa41c52ed35877c92a89f39c
-
SHA1
a7aa60ac6a7b82a1129293d58899c11fc55541f9
-
SHA256
cee6a824db51fa3e98bd2119da76feb8f48861741877479ac5324cd22478aced
-
SHA512
6fbbf72f68837da6e5efec4dab4d02f781b2d0961b5ee2f3dce6f33e2c9bf9ac30eac9e73ca069cf7b2d970d0dfcef52332e8910fc6c8b2ef4c5a8f2fe42464d
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlmoHR8uypf:b/yC4GyNM01GuQMNXw2PSjHPbSuYlZ6
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_872729afaa41c52ed35877c92a89f39c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-12_872729afaa41c52ed35877c92a89f39c_cryptolocker.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-12_872729afaa41c52ed35877c92a89f39c_cryptolocker
-
Size
42KB
-
MD5
872729afaa41c52ed35877c92a89f39c
-
SHA1
a7aa60ac6a7b82a1129293d58899c11fc55541f9
-
SHA256
cee6a824db51fa3e98bd2119da76feb8f48861741877479ac5324cd22478aced
-
SHA512
6fbbf72f68837da6e5efec4dab4d02f781b2d0961b5ee2f3dce6f33e2c9bf9ac30eac9e73ca069cf7b2d970d0dfcef52332e8910fc6c8b2ef4c5a8f2fe42464d
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlmoHR8uypf:b/yC4GyNM01GuQMNXw2PSjHPbSuYlZ6
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-