General
-
Target
2024-04-05_cd5ff9948c6df62d4cfd69e773c5740e_cryptolocker
-
Size
82KB
-
Sample
240405-ddvl6sbb33
-
MD5
cd5ff9948c6df62d4cfd69e773c5740e
-
SHA1
7a2b839234cea6cde13f3017ba46df6851f89dfd
-
SHA256
1efcc9c19e08b55e7962ad3df778685e6014927e541843e20978f44d113e9fd5
-
SHA512
88f4737da5f228b97923737e59b8a7faaeb174036f683d6053a6cb4ac3422f04a189535612b6f2677e3dd3762e2edea126fdb88298f056eb28684bae180e703b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT75:T6a+rdOOtEvwDpjNF
Behavioral task
behavioral1
Sample
2024-04-05_cd5ff9948c6df62d4cfd69e773c5740e_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-05_cd5ff9948c6df62d4cfd69e773c5740e_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-05_cd5ff9948c6df62d4cfd69e773c5740e_cryptolocker
-
Size
82KB
-
MD5
cd5ff9948c6df62d4cfd69e773c5740e
-
SHA1
7a2b839234cea6cde13f3017ba46df6851f89dfd
-
SHA256
1efcc9c19e08b55e7962ad3df778685e6014927e541843e20978f44d113e9fd5
-
SHA512
88f4737da5f228b97923737e59b8a7faaeb174036f683d6053a6cb4ac3422f04a189535612b6f2677e3dd3762e2edea126fdb88298f056eb28684bae180e703b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT75:T6a+rdOOtEvwDpjNF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-