General
-
Target
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker
-
Size
61KB
-
Sample
240229-fd4k7ade9t
-
MD5
4582ed3d8217d6c5ae80de47faaefc31
-
SHA1
c04758345c0e5f8fd7cfdad948abe63b800f0a9d
-
SHA256
ce6386af7a0e5608a824a97ac59ce703706110fdb525eb48b3804b7e8354e94d
-
SHA512
4b997937a7d8b0b7dcd3f2640eb2f7f08df89c3624c7802f70f69bdac9fbbd0d51c795614461096d410183d862b5d1b6746dd9e03a95c63fcdfe8cc8ce033f03
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwQ:zj+soPSMOtEvwDpj4kpmeLmnd
Behavioral task
behavioral1
Sample
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker
-
Size
61KB
-
MD5
4582ed3d8217d6c5ae80de47faaefc31
-
SHA1
c04758345c0e5f8fd7cfdad948abe63b800f0a9d
-
SHA256
ce6386af7a0e5608a824a97ac59ce703706110fdb525eb48b3804b7e8354e94d
-
SHA512
4b997937a7d8b0b7dcd3f2640eb2f7f08df89c3624c7802f70f69bdac9fbbd0d51c795614461096d410183d862b5d1b6746dd9e03a95c63fcdfe8cc8ce033f03
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwQ:zj+soPSMOtEvwDpj4kpmeLmnd
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-