General
-
Target
2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker
-
Size
122KB
-
Sample
240421-gphzasch53
-
MD5
c27207fa77d7c7b2c69730620e32c4d9
-
SHA1
9b772e958de9216d641c1a1552cd6d178cc39895
-
SHA256
2d070c31b40e6e876b4a20740b56d6912b2dfbd181034f9ee927d718782b4b34
-
SHA512
58b52aaaca86d7a67dec1a8e74453b3b76ac22778ffadde6e9883b99063ff783907bd6c796d0f71b4e77467d83536ee1e1a627a1d3949dfee3dc478b20128768
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviPeBu:z6a+CdOOtEvwDpjczN
Behavioral task
behavioral1
Sample
2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-21_c27207fa77d7c7b2c69730620e32c4d9_cryptolocker
-
Size
122KB
-
MD5
c27207fa77d7c7b2c69730620e32c4d9
-
SHA1
9b772e958de9216d641c1a1552cd6d178cc39895
-
SHA256
2d070c31b40e6e876b4a20740b56d6912b2dfbd181034f9ee927d718782b4b34
-
SHA512
58b52aaaca86d7a67dec1a8e74453b3b76ac22778ffadde6e9883b99063ff783907bd6c796d0f71b4e77467d83536ee1e1a627a1d3949dfee3dc478b20128768
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpwqWsviPeBu:z6a+CdOOtEvwDpjczN
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-