General
-
Target
2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker
-
Size
63KB
-
Sample
240409-hb7wyage94
-
MD5
569452321ec4cbc80cb48ab4b0322c00
-
SHA1
7e6159545e7879d33b92dffef8e1f1b20899d9e4
-
SHA256
d9dce06790f4914759d1d3a3350ca9589a8c88809b1c4557f9d8b41c764bc542
-
SHA512
a3116d7e668088188f50ca794ce16927a12986c961eb93ce94d5843915e01fa0500ca62d44e079943f5f91bc8c26c531ec902ef1aa893e3e842ae87dc72cafee
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jK5:P8mnK6QFElP6n+gymddpMOtEvwDpjY/
Behavioral task
behavioral1
Sample
2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-09_569452321ec4cbc80cb48ab4b0322c00_cryptolocker
-
Size
63KB
-
MD5
569452321ec4cbc80cb48ab4b0322c00
-
SHA1
7e6159545e7879d33b92dffef8e1f1b20899d9e4
-
SHA256
d9dce06790f4914759d1d3a3350ca9589a8c88809b1c4557f9d8b41c764bc542
-
SHA512
a3116d7e668088188f50ca794ce16927a12986c961eb93ce94d5843915e01fa0500ca62d44e079943f5f91bc8c26c531ec902ef1aa893e3e842ae87dc72cafee
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jK5:P8mnK6QFElP6n+gymddpMOtEvwDpjY/
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-