General
-
Target
2024-03-14_5457035898adde8b115a2912c633f6fe_cryptolocker
-
Size
61KB
-
Sample
240314-t4l1qabb56
-
MD5
5457035898adde8b115a2912c633f6fe
-
SHA1
74c7dc22dabd0543098eb12764327951d04cbdac
-
SHA256
3e529dc6a92896354ad633371c5a0fc905d20f01b77ca96ec6ef13cc3a2c8a07
-
SHA512
4aa2a227af88288ab7fce141d20cd160e16b91ac1158b3e77d6c180f7c8a7cfc6b8d0d82d1458c9ed5172f159fec7c01e6aa4bcb273fa433d0285b3a745df399
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR80:z6QFElP6n+gKmddpMOtEvwDpj9aYaFA2
Behavioral task
behavioral1
Sample
2024-03-14_5457035898adde8b115a2912c633f6fe_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_5457035898adde8b115a2912c633f6fe_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-14_5457035898adde8b115a2912c633f6fe_cryptolocker
-
Size
61KB
-
MD5
5457035898adde8b115a2912c633f6fe
-
SHA1
74c7dc22dabd0543098eb12764327951d04cbdac
-
SHA256
3e529dc6a92896354ad633371c5a0fc905d20f01b77ca96ec6ef13cc3a2c8a07
-
SHA512
4aa2a227af88288ab7fce141d20cd160e16b91ac1158b3e77d6c180f7c8a7cfc6b8d0d82d1458c9ed5172f159fec7c01e6aa4bcb273fa433d0285b3a745df399
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR80:z6QFElP6n+gKmddpMOtEvwDpj9aYaFA2
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-