General
-
Target
2024-04-16_ff6a070d35a3f8347d0f0da50d03d487_cryptolocker
-
Size
65KB
-
Sample
240416-jnshfscg52
-
MD5
ff6a070d35a3f8347d0f0da50d03d487
-
SHA1
05dabf67c118cf951dbed86594c72d12146a543e
-
SHA256
b71ad1688f924ff8ea830723005b9f37758941226f9ce66f0611d204be388707
-
SHA512
c0b9e3c12af9173cc1a7247f30281d35694c26b1ef441098f3bdfa007dfa7771d669422ea9657cc4fabd68e820bc4b614292aa1b64c5024a9a1c0fa6f81c83ab
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7AK2c:zj+soPSMOtEvwDpj4kpmeLmQlAlc
Behavioral task
behavioral1
Sample
2024-04-16_ff6a070d35a3f8347d0f0da50d03d487_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_ff6a070d35a3f8347d0f0da50d03d487_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-16_ff6a070d35a3f8347d0f0da50d03d487_cryptolocker
-
Size
65KB
-
MD5
ff6a070d35a3f8347d0f0da50d03d487
-
SHA1
05dabf67c118cf951dbed86594c72d12146a543e
-
SHA256
b71ad1688f924ff8ea830723005b9f37758941226f9ce66f0611d204be388707
-
SHA512
c0b9e3c12af9173cc1a7247f30281d35694c26b1ef441098f3bdfa007dfa7771d669422ea9657cc4fabd68e820bc4b614292aa1b64c5024a9a1c0fa6f81c83ab
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7AK2c:zj+soPSMOtEvwDpj4kpmeLmQlAlc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-