General
-
Target
2024-04-20_4cf58301660b05dc5b1863ad649215c8_cryptolocker
-
Size
38KB
-
Sample
240420-mw2mwaeg38
-
MD5
4cf58301660b05dc5b1863ad649215c8
-
SHA1
a82c00f3792bb08be352162b0497fcf840b51035
-
SHA256
2853bc3ac79c3bb81d7ed5d2e368420a095c03718ae7f0d1a64a90b1692d8e35
-
SHA512
02efd808911b0ec1a7921725633f72178fd036a28b1acd72f9a22e1d492d8edb5956b732d0a678af51522d01176e8f08676dd827c694bd38cae0b599bb4df8c9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9r:qDdFJy3QMOtEvwDpjjWMl7Tc
Behavioral task
behavioral1
Sample
2024-04-20_4cf58301660b05dc5b1863ad649215c8_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-20_4cf58301660b05dc5b1863ad649215c8_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_4cf58301660b05dc5b1863ad649215c8_cryptolocker
-
Size
38KB
-
MD5
4cf58301660b05dc5b1863ad649215c8
-
SHA1
a82c00f3792bb08be352162b0497fcf840b51035
-
SHA256
2853bc3ac79c3bb81d7ed5d2e368420a095c03718ae7f0d1a64a90b1692d8e35
-
SHA512
02efd808911b0ec1a7921725633f72178fd036a28b1acd72f9a22e1d492d8edb5956b732d0a678af51522d01176e8f08676dd827c694bd38cae0b599bb4df8c9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9r:qDdFJy3QMOtEvwDpjjWMl7Tc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-