General
-
Target
2024-04-05_8781a70d11fecd913838d44891001b74_cryptolocker
-
Size
71KB
-
Sample
240405-1ezc3sea83
-
MD5
8781a70d11fecd913838d44891001b74
-
SHA1
908e2e3ef3127313f0d7d89c192cd4b4ed0cec89
-
SHA256
3bb53540291c85684477c6b7cf7785ecc5dbe74efbc0ee99428545a8165c60c1
-
SHA512
5f78b34f9471b346f08539dc7be69e8790f60f362d2af537022bd4130aaa8acc664359a42c0cb558e47ea34751571513e10d78cca505d887612e2f89a96ac2fe
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBQ:z6a+CdOOtEvwDpjQ+
Behavioral task
behavioral1
Sample
2024-04-05_8781a70d11fecd913838d44891001b74_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_8781a70d11fecd913838d44891001b74_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-05_8781a70d11fecd913838d44891001b74_cryptolocker
-
Size
71KB
-
MD5
8781a70d11fecd913838d44891001b74
-
SHA1
908e2e3ef3127313f0d7d89c192cd4b4ed0cec89
-
SHA256
3bb53540291c85684477c6b7cf7785ecc5dbe74efbc0ee99428545a8165c60c1
-
SHA512
5f78b34f9471b346f08539dc7be69e8790f60f362d2af537022bd4130aaa8acc664359a42c0cb558e47ea34751571513e10d78cca505d887612e2f89a96ac2fe
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBQ:z6a+CdOOtEvwDpjQ+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-