General
-
Target
2024-04-20_518ed0b79d3a6f42e0f8d50da7e71217_cryptolocker
-
Size
65KB
-
Sample
240420-2cjqaabe67
-
MD5
518ed0b79d3a6f42e0f8d50da7e71217
-
SHA1
9843bc6b2d32ac519bcc2df52b7df852cb631e42
-
SHA256
0297ee1c63ba10a10953ebb57706dec59b6a7473a4118a7258b8a242d7f5cdaf
-
SHA512
a49353082449b9320990b36400cae96ebb5335ae784566bdaa16976be430550097167f54ee8d3699402f6e11abd728474b92b5f086acf8a8ad092e3f47d126b6
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyS:1nK6a+qdOOtEvwDpjd
Behavioral task
behavioral1
Sample
2024-04-20_518ed0b79d3a6f42e0f8d50da7e71217_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_518ed0b79d3a6f42e0f8d50da7e71217_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_518ed0b79d3a6f42e0f8d50da7e71217_cryptolocker
-
Size
65KB
-
MD5
518ed0b79d3a6f42e0f8d50da7e71217
-
SHA1
9843bc6b2d32ac519bcc2df52b7df852cb631e42
-
SHA256
0297ee1c63ba10a10953ebb57706dec59b6a7473a4118a7258b8a242d7f5cdaf
-
SHA512
a49353082449b9320990b36400cae96ebb5335ae784566bdaa16976be430550097167f54ee8d3699402f6e11abd728474b92b5f086acf8a8ad092e3f47d126b6
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyS:1nK6a+qdOOtEvwDpjd
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-