General
-
Target
2024-04-04_05aa98df61d9db9cd0611816e212b8c9_cryptolocker
-
Size
79KB
-
Sample
240404-z88m6sbe35
-
MD5
05aa98df61d9db9cd0611816e212b8c9
-
SHA1
1744d31dafd418865dea49f05c1dc1309a799db7
-
SHA256
21679f02ed957d2625700f0e73a08e5ceb309eca307de9acd06705e64fbe9f52
-
SHA512
4dd3cb45e8481cb969416bd5a527609fe50740122ff26c9798a01cf928ab032f428a33056b4ad7729c7418dfe2af3c6241c5dc2ab26cb0ee80cef056845aa6c5
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qp/:zCsanOtEvwDpjl
Behavioral task
behavioral1
Sample
2024-04-04_05aa98df61d9db9cd0611816e212b8c9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-04_05aa98df61d9db9cd0611816e212b8c9_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-04_05aa98df61d9db9cd0611816e212b8c9_cryptolocker
-
Size
79KB
-
MD5
05aa98df61d9db9cd0611816e212b8c9
-
SHA1
1744d31dafd418865dea49f05c1dc1309a799db7
-
SHA256
21679f02ed957d2625700f0e73a08e5ceb309eca307de9acd06705e64fbe9f52
-
SHA512
4dd3cb45e8481cb969416bd5a527609fe50740122ff26c9798a01cf928ab032f428a33056b4ad7729c7418dfe2af3c6241c5dc2ab26cb0ee80cef056845aa6c5
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qp/:zCsanOtEvwDpjl
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-