General
-
Target
2024-04-20_40434d9126d558c8459e0696876bfa6e_cryptolocker
-
Size
102KB
-
Sample
240420-1a5z3aah8t
-
MD5
40434d9126d558c8459e0696876bfa6e
-
SHA1
f58998974d86a687fda8058569185496845c5811
-
SHA256
5a9c2c88210993d18866d1b5cca32ce6ed94856941547286e6f2f2b6b2d74df9
-
SHA512
f3db7f92fc407994ff847279d1918f8440c58a1c430d3daf4ebf907154ab0158ef98ffb2ea0dc44fcd3595988f11c351db3ee9453e8d6c0d3488d0780d18ffea
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBS:AnBdOOtEvwDpj6zp
Behavioral task
behavioral1
Sample
2024-04-20_40434d9126d558c8459e0696876bfa6e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_40434d9126d558c8459e0696876bfa6e_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_40434d9126d558c8459e0696876bfa6e_cryptolocker
-
Size
102KB
-
MD5
40434d9126d558c8459e0696876bfa6e
-
SHA1
f58998974d86a687fda8058569185496845c5811
-
SHA256
5a9c2c88210993d18866d1b5cca32ce6ed94856941547286e6f2f2b6b2d74df9
-
SHA512
f3db7f92fc407994ff847279d1918f8440c58a1c430d3daf4ebf907154ab0158ef98ffb2ea0dc44fcd3595988f11c351db3ee9453e8d6c0d3488d0780d18ffea
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBS:AnBdOOtEvwDpj6zp
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-