General
-
Target
2024-04-16_8d1278e8dc70d1f5d1f345b658ce179c_cryptolocker
-
Size
37KB
-
Sample
240416-kj2e8sde89
-
MD5
8d1278e8dc70d1f5d1f345b658ce179c
-
SHA1
41986d2062d46bab43d3db18c4da29e9f50cec44
-
SHA256
eca06b0379573fc855f022a8ed02f8ed22727a2ec19c07f78710d8625669d85b
-
SHA512
355ed65f370ff92410df9dd34ce73e1534f1cf426f16684fcf79168892e8b4132c8077881db1ed191a1f970971157a479e4aa0e520ae2724b219d70bb86dbaec
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYl:qDdFJy3QMOtEvwDpjjWMl7Tg
Behavioral task
behavioral1
Sample
2024-04-16_8d1278e8dc70d1f5d1f345b658ce179c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_8d1278e8dc70d1f5d1f345b658ce179c_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-16_8d1278e8dc70d1f5d1f345b658ce179c_cryptolocker
-
Size
37KB
-
MD5
8d1278e8dc70d1f5d1f345b658ce179c
-
SHA1
41986d2062d46bab43d3db18c4da29e9f50cec44
-
SHA256
eca06b0379573fc855f022a8ed02f8ed22727a2ec19c07f78710d8625669d85b
-
SHA512
355ed65f370ff92410df9dd34ce73e1534f1cf426f16684fcf79168892e8b4132c8077881db1ed191a1f970971157a479e4aa0e520ae2724b219d70bb86dbaec
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYl:qDdFJy3QMOtEvwDpjjWMl7Tg
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-