General
-
Target
2024-04-08_dbb9226ea8fb781fa313f6f35bd875c8_cryptolocker
-
Size
65KB
-
Sample
240408-s7ev5sgc91
-
MD5
dbb9226ea8fb781fa313f6f35bd875c8
-
SHA1
45aa2ec5c0289e9feffaddb3a5fbc0c1110ef6e5
-
SHA256
1e935fdad041536304b579b675a7ca002efe25f3cf3902b88066efcb3455a352
-
SHA512
0407051eef2a110dfaeabec5e16a5e73d7a37c8d7e57066a43f720c32410733a4380b893d2eeb9f7212db89d09bfd2b4e92128477e8dc2432f69f6708f1e47c3
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRJ9:1nK6a+qdOOtEvwDpjq
Behavioral task
behavioral1
Sample
2024-04-08_dbb9226ea8fb781fa313f6f35bd875c8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_dbb9226ea8fb781fa313f6f35bd875c8_cryptolocker.exe
Resource
win10v2004-20240319-en
Malware Config
Targets
-
-
Target
2024-04-08_dbb9226ea8fb781fa313f6f35bd875c8_cryptolocker
-
Size
65KB
-
MD5
dbb9226ea8fb781fa313f6f35bd875c8
-
SHA1
45aa2ec5c0289e9feffaddb3a5fbc0c1110ef6e5
-
SHA256
1e935fdad041536304b579b675a7ca002efe25f3cf3902b88066efcb3455a352
-
SHA512
0407051eef2a110dfaeabec5e16a5e73d7a37c8d7e57066a43f720c32410733a4380b893d2eeb9f7212db89d09bfd2b4e92128477e8dc2432f69f6708f1e47c3
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRJ9:1nK6a+qdOOtEvwDpjq
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-