General
-
Target
2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker
-
Size
89KB
-
Sample
240423-zgldkabf2s
-
MD5
4ecdc6ec73a4e6fcf297a882cc2fe5d9
-
SHA1
d810dc4359960cb512125ad57b2bb0cc13adf350
-
SHA256
7df96ca9c551caa33518ee96459f6abcf92fd7c9dce63773d7224095a9464a36
-
SHA512
52a3355a3e53ebc3131007e6de00e1e115eb88c225f0c9d9e3449afa69ab7083909589768f07d135b0d9abc2111f7e5f01ce168fb7411c55be64e3ba7432c677
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAu:n6a+1SEOtEvwDpjYYvQd2Pu
Behavioral task
behavioral1
Sample
2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-23_4ecdc6ec73a4e6fcf297a882cc2fe5d9_cryptolocker
-
Size
89KB
-
MD5
4ecdc6ec73a4e6fcf297a882cc2fe5d9
-
SHA1
d810dc4359960cb512125ad57b2bb0cc13adf350
-
SHA256
7df96ca9c551caa33518ee96459f6abcf92fd7c9dce63773d7224095a9464a36
-
SHA512
52a3355a3e53ebc3131007e6de00e1e115eb88c225f0c9d9e3449afa69ab7083909589768f07d135b0d9abc2111f7e5f01ce168fb7411c55be64e3ba7432c677
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAu:n6a+1SEOtEvwDpjYYvQd2Pu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-