General
-
Target
2024-04-20_ea795d4d0cafefaf050d6da8441dd99e_cryptolocker
-
Size
38KB
-
Sample
240420-eqzmbsga75
-
MD5
ea795d4d0cafefaf050d6da8441dd99e
-
SHA1
c228ff48348b4c4cf7481cc2f024e671384ddb84
-
SHA256
9a5d221dd999830c2919baa6bcff247263cfa38ca526644e3ae0127b3fc1c7fd
-
SHA512
db338f143eb36d7bf8c8024b7962c6eeb72e8eabee8582189ad5b90958384c3aea8a5da3335fd4181e2e65d262cc25315f9446abce44860a4da356f4a0c961b0
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYar:qDdFJy3QMOtEvwDpjjWMl7Tdr
Behavioral task
behavioral1
Sample
2024-04-20_ea795d4d0cafefaf050d6da8441dd99e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_ea795d4d0cafefaf050d6da8441dd99e_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-20_ea795d4d0cafefaf050d6da8441dd99e_cryptolocker
-
Size
38KB
-
MD5
ea795d4d0cafefaf050d6da8441dd99e
-
SHA1
c228ff48348b4c4cf7481cc2f024e671384ddb84
-
SHA256
9a5d221dd999830c2919baa6bcff247263cfa38ca526644e3ae0127b3fc1c7fd
-
SHA512
db338f143eb36d7bf8c8024b7962c6eeb72e8eabee8582189ad5b90958384c3aea8a5da3335fd4181e2e65d262cc25315f9446abce44860a4da356f4a0c961b0
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYar:qDdFJy3QMOtEvwDpjjWMl7Tdr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-