General
-
Target
2024-04-17_5521f34e003b87c4de2077135c982763_cryptolocker
-
Size
37KB
-
Sample
240417-vazv6ahc31
-
MD5
5521f34e003b87c4de2077135c982763
-
SHA1
772966426a939e4a539ad05fe5dfdefd1a2f92b9
-
SHA256
3cf1d91f3d9a529c7c1d5a5372e479f84e69d7329863c443d134cc04e3e49fe2
-
SHA512
957f3e7787a51cbc71f012afc66f96f8990c794c066569e168207e3d314ea302d31b7c63d7ba1be3f39faa8e47bec45442016f0a1fffef0bc585234d97f86bba
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYQ:qDdFJy3QMOtEvwDpjjWMl7T1
Behavioral task
behavioral1
Sample
2024-04-17_5521f34e003b87c4de2077135c982763_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_5521f34e003b87c4de2077135c982763_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-17_5521f34e003b87c4de2077135c982763_cryptolocker
-
Size
37KB
-
MD5
5521f34e003b87c4de2077135c982763
-
SHA1
772966426a939e4a539ad05fe5dfdefd1a2f92b9
-
SHA256
3cf1d91f3d9a529c7c1d5a5372e479f84e69d7329863c443d134cc04e3e49fe2
-
SHA512
957f3e7787a51cbc71f012afc66f96f8990c794c066569e168207e3d314ea302d31b7c63d7ba1be3f39faa8e47bec45442016f0a1fffef0bc585234d97f86bba
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYQ:qDdFJy3QMOtEvwDpjjWMl7T1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-