General
-
Target
2024-04-20_5d8178aa7427102e17e86c90d7b9cbc6_cryptolocker
-
Size
49KB
-
Sample
240420-y85e3shf9s
-
MD5
5d8178aa7427102e17e86c90d7b9cbc6
-
SHA1
b36cbba5fc51e271359850507c15b0bf568287b7
-
SHA256
a467af43cbc1ff73fb45e64a0e304bbe65c2303050224df11a96fff27dfea0e5
-
SHA512
b43863b1549f6e00de5f59fb8010251793e68fd005342582fa5e2cfb9ae8e9ebe2dc80316709d85639ef66ef3062782b2cf9932e8e7d1bdbfe2dbfaddc0836e3
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocs:qmbhXDmjr5MOtEvwDpj5cDtKkQZQh
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_5d8178aa7427102e17e86c90d7b9cbc6_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_5d8178aa7427102e17e86c90d7b9cbc6_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_5d8178aa7427102e17e86c90d7b9cbc6_cryptolocker
-
Size
49KB
-
MD5
5d8178aa7427102e17e86c90d7b9cbc6
-
SHA1
b36cbba5fc51e271359850507c15b0bf568287b7
-
SHA256
a467af43cbc1ff73fb45e64a0e304bbe65c2303050224df11a96fff27dfea0e5
-
SHA512
b43863b1549f6e00de5f59fb8010251793e68fd005342582fa5e2cfb9ae8e9ebe2dc80316709d85639ef66ef3062782b2cf9932e8e7d1bdbfe2dbfaddc0836e3
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocs:qmbhXDmjr5MOtEvwDpj5cDtKkQZQh
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-