General
-
Target
2024-04-20_70f433c7405d0f2f49b483a288d40bb4_cryptolocker
-
Size
38KB
-
Sample
240420-kfer3acf36
-
MD5
70f433c7405d0f2f49b483a288d40bb4
-
SHA1
d1a70526e57e73060a202df5e02f789da196c4ea
-
SHA256
9d667d9ffbb6c41d47df3faa850cd717664f9f40b12a18591c5538fbe987a371
-
SHA512
b075c7114802b506bad2448a882840ae6863da86384efc6f1d9747658475f2ce5e395e412e07a82d9e717b1904a3eaf382c13f1275a0ba381d2d807db81fef8e
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F:qDdFJy3QMOtEvwDpjjWMl7T2
Behavioral task
behavioral1
Sample
2024-04-20_70f433c7405d0f2f49b483a288d40bb4_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_70f433c7405d0f2f49b483a288d40bb4_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-20_70f433c7405d0f2f49b483a288d40bb4_cryptolocker
-
Size
38KB
-
MD5
70f433c7405d0f2f49b483a288d40bb4
-
SHA1
d1a70526e57e73060a202df5e02f789da196c4ea
-
SHA256
9d667d9ffbb6c41d47df3faa850cd717664f9f40b12a18591c5538fbe987a371
-
SHA512
b075c7114802b506bad2448a882840ae6863da86384efc6f1d9747658475f2ce5e395e412e07a82d9e717b1904a3eaf382c13f1275a0ba381d2d807db81fef8e
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F:qDdFJy3QMOtEvwDpjjWMl7T2
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-