General
-
Target
2024-04-10_061769dbccd4acaa8d331379df79600b_cryptolocker
-
Size
102KB
-
Sample
240410-txe9laha3y
-
MD5
061769dbccd4acaa8d331379df79600b
-
SHA1
06249ab5986f8ae1e55d8190852cafbbde41c9fc
-
SHA256
15c9655f9e811cd2accbb5add7aba461bf38be0eef7123a8da33c3deaff9b019
-
SHA512
22f69f9d69bb48c504d3382f153d81a1789edce5306aff2784165ea7ad661b5d8728959da79f26e438fb3f2e98eb6e9b7933154db3ab5b3883d69f20d182d9ca
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBr:AnBdOOtEvwDpj6zE
Behavioral task
behavioral1
Sample
2024-04-10_061769dbccd4acaa8d331379df79600b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_061769dbccd4acaa8d331379df79600b_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-10_061769dbccd4acaa8d331379df79600b_cryptolocker
-
Size
102KB
-
MD5
061769dbccd4acaa8d331379df79600b
-
SHA1
06249ab5986f8ae1e55d8190852cafbbde41c9fc
-
SHA256
15c9655f9e811cd2accbb5add7aba461bf38be0eef7123a8da33c3deaff9b019
-
SHA512
22f69f9d69bb48c504d3382f153d81a1789edce5306aff2784165ea7ad661b5d8728959da79f26e438fb3f2e98eb6e9b7933154db3ab5b3883d69f20d182d9ca
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBr:AnBdOOtEvwDpj6zE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-