General
-
Target
2024-04-22_8474610682e93e81bc16267d36ba9d07_cryptolocker
-
Size
38KB
-
Sample
240422-yzmhxaff7y
-
MD5
8474610682e93e81bc16267d36ba9d07
-
SHA1
c52e9ffbef26f1d53e587b61940fe821b8a67f72
-
SHA256
696fa0e56104f9de786acc12f328ca70bb5aa2acbbbd8366616b664105198403
-
SHA512
e9a98254adecce589d82c37ba9e990f4b39849534834c2c861e7fca7f62ce287016e12cd4684a702437864a8ced198bc5ad9be3a2b24dd33eebddc84abee7bd1
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYe:qDdFJy3QMOtEvwDpjjWMl7Tf
Behavioral task
behavioral1
Sample
2024-04-22_8474610682e93e81bc16267d36ba9d07_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_8474610682e93e81bc16267d36ba9d07_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-22_8474610682e93e81bc16267d36ba9d07_cryptolocker
-
Size
38KB
-
MD5
8474610682e93e81bc16267d36ba9d07
-
SHA1
c52e9ffbef26f1d53e587b61940fe821b8a67f72
-
SHA256
696fa0e56104f9de786acc12f328ca70bb5aa2acbbbd8366616b664105198403
-
SHA512
e9a98254adecce589d82c37ba9e990f4b39849534834c2c861e7fca7f62ce287016e12cd4684a702437864a8ced198bc5ad9be3a2b24dd33eebddc84abee7bd1
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYe:qDdFJy3QMOtEvwDpjjWMl7Tf
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-