General
-
Target
2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker
-
Size
80KB
-
Sample
240423-fah53sdb73
-
MD5
5e8970d876b329c4c8368b730721ef0d
-
SHA1
9bf87266151d55b5ed9d31d7944e39d43c2c8263
-
SHA256
0e12d43b8dfd0d5cb2c0c55ed6edd6c08c90aca0b444bccf2dbef0c99be44bac
-
SHA512
d47c1d73445fa72ee61c2f8f8e47e0f8a2766f4307531c944e79dec7452c21ab21b49b7c817029cff5ffef82cb161e5fb4fa4c2f0a54eb84637313d1f6d4752b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd7:T6a+rdOOtEvwDpjNt9
Behavioral task
behavioral1
Sample
2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-23_5e8970d876b329c4c8368b730721ef0d_cryptolocker
-
Size
80KB
-
MD5
5e8970d876b329c4c8368b730721ef0d
-
SHA1
9bf87266151d55b5ed9d31d7944e39d43c2c8263
-
SHA256
0e12d43b8dfd0d5cb2c0c55ed6edd6c08c90aca0b444bccf2dbef0c99be44bac
-
SHA512
d47c1d73445fa72ee61c2f8f8e47e0f8a2766f4307531c944e79dec7452c21ab21b49b7c817029cff5ffef82cb161e5fb4fa4c2f0a54eb84637313d1f6d4752b
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd7:T6a+rdOOtEvwDpjNt9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-