General
-
Target
2024-04-18_61ac64a8af13f3ed7c3112331e8e8de7_cryptolocker
-
Size
82KB
-
Sample
240418-pt98cadd52
-
MD5
61ac64a8af13f3ed7c3112331e8e8de7
-
SHA1
e2e393e17c74efb5e49944be59880f2a3bf90b04
-
SHA256
51ea5120ab0b6f7c109460186257a46a6f5b9b2f2448db828d3b9d710addf375
-
SHA512
36bdaca487cca374b324a55f86b294cdba50071dbaf9a7b8504d63d1c09d32a419c589699f21fa839248fffb84d970d4671283e91b0038237c7665f5a986632e
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0J:T6a+rdOOtEvwDpjNty
Behavioral task
behavioral1
Sample
2024-04-18_61ac64a8af13f3ed7c3112331e8e8de7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_61ac64a8af13f3ed7c3112331e8e8de7_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-18_61ac64a8af13f3ed7c3112331e8e8de7_cryptolocker
-
Size
82KB
-
MD5
61ac64a8af13f3ed7c3112331e8e8de7
-
SHA1
e2e393e17c74efb5e49944be59880f2a3bf90b04
-
SHA256
51ea5120ab0b6f7c109460186257a46a6f5b9b2f2448db828d3b9d710addf375
-
SHA512
36bdaca487cca374b324a55f86b294cdba50071dbaf9a7b8504d63d1c09d32a419c589699f21fa839248fffb84d970d4671283e91b0038237c7665f5a986632e
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0J:T6a+rdOOtEvwDpjNty
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-