General
-
Target
2024-04-05_3395737fecd2793ed399afa642a562fd_cryptolocker
-
Size
58KB
-
Sample
240405-e2dh8scf46
-
MD5
3395737fecd2793ed399afa642a562fd
-
SHA1
5bca4f381db58559f2411f32fb2ff8afc25c8383
-
SHA256
dd0d1167afd519fbeac4f674f06282588c99c576115f690cbe5afd339c0d5f23
-
SHA512
2373c28c22666cd62c12cf2005397b0a22f7436238cf089da7970c61a27cfbf16750c2576f0e4f47f8e10362cebade68f992c438fdb26b4468f19a63e9bdc868
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYa59Rl:z6a+CdOOtEvwDpjQd
Behavioral task
behavioral1
Sample
2024-04-05_3395737fecd2793ed399afa642a562fd_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_3395737fecd2793ed399afa642a562fd_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-05_3395737fecd2793ed399afa642a562fd_cryptolocker
-
Size
58KB
-
MD5
3395737fecd2793ed399afa642a562fd
-
SHA1
5bca4f381db58559f2411f32fb2ff8afc25c8383
-
SHA256
dd0d1167afd519fbeac4f674f06282588c99c576115f690cbe5afd339c0d5f23
-
SHA512
2373c28c22666cd62c12cf2005397b0a22f7436238cf089da7970c61a27cfbf16750c2576f0e4f47f8e10362cebade68f992c438fdb26b4468f19a63e9bdc868
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYa59Rl:z6a+CdOOtEvwDpjQd
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-