General
-
Target
2024-04-21_2a51ffaf734a6a0d047e94adef01c471_cryptolocker
-
Size
89KB
-
Sample
240421-x646vsab37
-
MD5
2a51ffaf734a6a0d047e94adef01c471
-
SHA1
efbc0e03d3aa941c1195704a92fbb90fd38d63d1
-
SHA256
6fd88485cd561d9f395029b5781fcd6e45a1f6c4444a96eccd9920420592c1da
-
SHA512
878912c37038741e475b48aadb5b10d914dbbc503df72a4aa47c8d0d001affd046d7257cc566542788b17c829c1dfbdb20ad76d4bda097159e0935155c351289
-
SSDEEP
1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAE:H6a+uSEOtEvwDpjrYvQd2PE
Behavioral task
behavioral1
Sample
2024-04-21_2a51ffaf734a6a0d047e94adef01c471_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_2a51ffaf734a6a0d047e94adef01c471_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-21_2a51ffaf734a6a0d047e94adef01c471_cryptolocker
-
Size
89KB
-
MD5
2a51ffaf734a6a0d047e94adef01c471
-
SHA1
efbc0e03d3aa941c1195704a92fbb90fd38d63d1
-
SHA256
6fd88485cd561d9f395029b5781fcd6e45a1f6c4444a96eccd9920420592c1da
-
SHA512
878912c37038741e475b48aadb5b10d914dbbc503df72a4aa47c8d0d001affd046d7257cc566542788b17c829c1dfbdb20ad76d4bda097159e0935155c351289
-
SSDEEP
1536:H6QFElP6n+gou9cvMOtEvwDpjrYTjipvF2bx1PQAE:H6a+uSEOtEvwDpjrYvQd2PE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-