General
-
Target
2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker
-
Size
62KB
-
Sample
240415-gcxlxsad6t
-
MD5
2ed43dafbfa50c8dae7b15abe1623c88
-
SHA1
5c50c67d9c9ca1f7c260c18df911f4a4dd647712
-
SHA256
30ecd10d4f2f1311abe77973a557be878fe4b03f14efc3ff3c1d4ff67f76813f
-
SHA512
a56d52186eb280c248dfdc9606b6314ac0cbaa321d36ba55cf6335a29ac4864074c1573891dec1451c82e5534297ccb4dd7e5050d58c91511a39716d335964cd
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiA:BbdDmjr+OtEvwDpjM8J
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker
-
Size
62KB
-
MD5
2ed43dafbfa50c8dae7b15abe1623c88
-
SHA1
5c50c67d9c9ca1f7c260c18df911f4a4dd647712
-
SHA256
30ecd10d4f2f1311abe77973a557be878fe4b03f14efc3ff3c1d4ff67f76813f
-
SHA512
a56d52186eb280c248dfdc9606b6314ac0cbaa321d36ba55cf6335a29ac4864074c1573891dec1451c82e5534297ccb4dd7e5050d58c91511a39716d335964cd
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiA:BbdDmjr+OtEvwDpjM8J
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-