General
-
Target
2024-04-06_b57db6b4ac9aabc1352fff218d2a242c_cryptolocker
-
Size
100KB
-
Sample
240406-dcl9eahd7w
-
MD5
b57db6b4ac9aabc1352fff218d2a242c
-
SHA1
42067f45e4afaa877653f5f1f4d73e00baa06dc3
-
SHA256
b2cd76fe890332645461c1f554b4529c38ef461e1d6463cd89383f3430184d28
-
SHA512
219ee2fa3e4710fba523b85dcf8d8435fccd923d81f2a3c04297963bdc13953d481b31b5a9f90866eec6f04b4c41f58245114f89f39e3d3ad770b816592e93f2
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPy8+:AnBdOOtEvwDpj6zu
Behavioral task
behavioral1
Sample
2024-04-06_b57db6b4ac9aabc1352fff218d2a242c_cryptolocker.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-06_b57db6b4ac9aabc1352fff218d2a242c_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-06_b57db6b4ac9aabc1352fff218d2a242c_cryptolocker
-
Size
100KB
-
MD5
b57db6b4ac9aabc1352fff218d2a242c
-
SHA1
42067f45e4afaa877653f5f1f4d73e00baa06dc3
-
SHA256
b2cd76fe890332645461c1f554b4529c38ef461e1d6463cd89383f3430184d28
-
SHA512
219ee2fa3e4710fba523b85dcf8d8435fccd923d81f2a3c04297963bdc13953d481b31b5a9f90866eec6f04b4c41f58245114f89f39e3d3ad770b816592e93f2
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPy8+:AnBdOOtEvwDpj6zu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-