General
-
Target
2024-04-20_9620d2e7d10d0fae6ec471c6cdeeb742_cryptolocker
-
Size
106KB
-
Sample
240420-xf1qrafb64
-
MD5
9620d2e7d10d0fae6ec471c6cdeeb742
-
SHA1
4e981bb470d74625370d0c8a5f56fd438c419ad6
-
SHA256
0aadd0e4c28a02a69fc91107323a68565330ba017dca52e37df8360565417e5a
-
SHA512
3b10206052be47d1b855fe91fdd7f12cadbe1fb816a6ba794cfae9a5bb0af8ba63e6f8e41ccf054c901003ea2781cb93dd491bce440b6049d10c3bbe43e3ea0d
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksdEr:1nK6a+qdOOtEvwDpjQ
Behavioral task
behavioral1
Sample
2024-04-20_9620d2e7d10d0fae6ec471c6cdeeb742_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_9620d2e7d10d0fae6ec471c6cdeeb742_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_9620d2e7d10d0fae6ec471c6cdeeb742_cryptolocker
-
Size
106KB
-
MD5
9620d2e7d10d0fae6ec471c6cdeeb742
-
SHA1
4e981bb470d74625370d0c8a5f56fd438c419ad6
-
SHA256
0aadd0e4c28a02a69fc91107323a68565330ba017dca52e37df8360565417e5a
-
SHA512
3b10206052be47d1b855fe91fdd7f12cadbe1fb816a6ba794cfae9a5bb0af8ba63e6f8e41ccf054c901003ea2781cb93dd491bce440b6049d10c3bbe43e3ea0d
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksdEr:1nK6a+qdOOtEvwDpjQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-