General
-
Target
2024-04-23_4afd6fc4f02986402cd45f4708a5e03e_cryptolocker
-
Size
57KB
-
Sample
240423-d46r5ace6s
-
MD5
4afd6fc4f02986402cd45f4708a5e03e
-
SHA1
b297df31cf83861fb70f9a211b1db899fe073670
-
SHA256
4d26b36f4ae066e45b6d8a5cbf8370f509c215468130783970f3c26e5d8ad530
-
SHA512
191f7d6da5c8ee3d34667c1ba4fd57d7614e7a8b064d3e53dee0bf83ca7e7b9e92cb0d89413b029f7f5eb7f4e207e449dd2b9d93b16d2ae0dfdfa8af7562f1cd
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP2:H6QFElP6n+gou9cvMOtEvwDpjCpVXr
Behavioral task
behavioral1
Sample
2024-04-23_4afd6fc4f02986402cd45f4708a5e03e_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-23_4afd6fc4f02986402cd45f4708a5e03e_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-23_4afd6fc4f02986402cd45f4708a5e03e_cryptolocker
-
Size
57KB
-
MD5
4afd6fc4f02986402cd45f4708a5e03e
-
SHA1
b297df31cf83861fb70f9a211b1db899fe073670
-
SHA256
4d26b36f4ae066e45b6d8a5cbf8370f509c215468130783970f3c26e5d8ad530
-
SHA512
191f7d6da5c8ee3d34667c1ba4fd57d7614e7a8b064d3e53dee0bf83ca7e7b9e92cb0d89413b029f7f5eb7f4e207e449dd2b9d93b16d2ae0dfdfa8af7562f1cd
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP2:H6QFElP6n+gou9cvMOtEvwDpjCpVXr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-