General
-
Target
2024-04-16_73277f5a8d2738091cf9f44ef81b0589_cryptolocker
-
Size
129KB
-
Sample
240416-b5zzvsgb5t
-
MD5
73277f5a8d2738091cf9f44ef81b0589
-
SHA1
6c88b7495204ed5e7b9234e9c2dd9f80f36c3d2e
-
SHA256
51ae63d04cefe814a141c9b13dd9f09e53283768628bbbb27e766eaf3e5a3085
-
SHA512
5975368cb5aebdcfd15e1b377441f101167cdbd3ec7341dcf6e103a78c0e07939b157fbd6382fb291dfe0fecef1105766d02178db5d50aed54e11ef0fcc92d3f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI7K:AnBdOOtEvwDpj6z/
Behavioral task
behavioral1
Sample
2024-04-16_73277f5a8d2738091cf9f44ef81b0589_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_73277f5a8d2738091cf9f44ef81b0589_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-16_73277f5a8d2738091cf9f44ef81b0589_cryptolocker
-
Size
129KB
-
MD5
73277f5a8d2738091cf9f44ef81b0589
-
SHA1
6c88b7495204ed5e7b9234e9c2dd9f80f36c3d2e
-
SHA256
51ae63d04cefe814a141c9b13dd9f09e53283768628bbbb27e766eaf3e5a3085
-
SHA512
5975368cb5aebdcfd15e1b377441f101167cdbd3ec7341dcf6e103a78c0e07939b157fbd6382fb291dfe0fecef1105766d02178db5d50aed54e11ef0fcc92d3f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI7K:AnBdOOtEvwDpj6z/
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-