General
-
Target
2024-04-06_8511540d8f375cd50bd0bf8ed710f260_cryptolocker
-
Size
63KB
-
Sample
240406-a5ylcsfg9t
-
MD5
8511540d8f375cd50bd0bf8ed710f260
-
SHA1
b789bede06c43c69d3bd359c35cc378c18990db2
-
SHA256
937024fc00d77d962c9a6477b7c89c2b9bd9575aec86782ea9c74335b790662a
-
SHA512
b4035364a86ea8a4d45f6cffa08c943e38ef94a3220a420c9100f4e76ef2939564062817a7af5d6ab2436a121a62fdb212b7ec22c39cdc310dbef3f9fbd1c121
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hR33z:zj+soPSMOtEvwDpj4kpmeLmq33z
Behavioral task
behavioral1
Sample
2024-04-06_8511540d8f375cd50bd0bf8ed710f260_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-06_8511540d8f375cd50bd0bf8ed710f260_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-06_8511540d8f375cd50bd0bf8ed710f260_cryptolocker
-
Size
63KB
-
MD5
8511540d8f375cd50bd0bf8ed710f260
-
SHA1
b789bede06c43c69d3bd359c35cc378c18990db2
-
SHA256
937024fc00d77d962c9a6477b7c89c2b9bd9575aec86782ea9c74335b790662a
-
SHA512
b4035364a86ea8a4d45f6cffa08c943e38ef94a3220a420c9100f4e76ef2939564062817a7af5d6ab2436a121a62fdb212b7ec22c39cdc310dbef3f9fbd1c121
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hR33z:zj+soPSMOtEvwDpj4kpmeLmq33z
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-