General
-
Target
2024-04-09_0047756365194b00acaf2d84e80b71e5_cryptolocker
-
Size
51KB
-
Sample
240409-nh9l1aha2t
-
MD5
0047756365194b00acaf2d84e80b71e5
-
SHA1
9e083015ef63d51d4b134746e4a5804b4db3a031
-
SHA256
4b2583723fd02b6a696a14da198af54626faf1f3a6545c230c9d7f77a498e039
-
SHA512
5d33d7d8ba4a83f1d404bb56873452d37db4ca0754ba72f2a7a1cd80ab9c1ff122a7615c4366c9619c9bdc6615aa251bfecfd1f3f7e4b54cd530980d30221b7c
-
SSDEEP
1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQ0Q:m4Q2ckzIOtEvwDpj4HYS
Behavioral task
behavioral1
Sample
2024-04-09_0047756365194b00acaf2d84e80b71e5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_0047756365194b00acaf2d84e80b71e5_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-09_0047756365194b00acaf2d84e80b71e5_cryptolocker
-
Size
51KB
-
MD5
0047756365194b00acaf2d84e80b71e5
-
SHA1
9e083015ef63d51d4b134746e4a5804b4db3a031
-
SHA256
4b2583723fd02b6a696a14da198af54626faf1f3a6545c230c9d7f77a498e039
-
SHA512
5d33d7d8ba4a83f1d404bb56873452d37db4ca0754ba72f2a7a1cd80ab9c1ff122a7615c4366c9619c9bdc6615aa251bfecfd1f3f7e4b54cd530980d30221b7c
-
SSDEEP
1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQ0Q:m4Q2ckzIOtEvwDpj4HYS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-