General
-
Target
2024-04-23_ac098d03a3b0f08215270631fba1bd18_cryptolocker
-
Size
76KB
-
Sample
240423-zp7xjabh35
-
MD5
ac098d03a3b0f08215270631fba1bd18
-
SHA1
8479eefe315c755c0cf642a30cdb88e831d1ee08
-
SHA256
3eeb45eef124233f91a01b0fc7519c765e544a43489d45cf8a79831be8928a91
-
SHA512
dd3f6a633a5bde353cf152bbf023658e0615ea67514f99f467339686d27f53e9893a4b49a5632f405f71a391adcbffc44fe1feb50cf87a433ce5d36e17152ef8
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxBR:T6a+rdOOtEvwDpjNtHPQ
Behavioral task
behavioral1
Sample
2024-04-23_ac098d03a3b0f08215270631fba1bd18_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-23_ac098d03a3b0f08215270631fba1bd18_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-23_ac098d03a3b0f08215270631fba1bd18_cryptolocker
-
Size
76KB
-
MD5
ac098d03a3b0f08215270631fba1bd18
-
SHA1
8479eefe315c755c0cf642a30cdb88e831d1ee08
-
SHA256
3eeb45eef124233f91a01b0fc7519c765e544a43489d45cf8a79831be8928a91
-
SHA512
dd3f6a633a5bde353cf152bbf023658e0615ea67514f99f467339686d27f53e9893a4b49a5632f405f71a391adcbffc44fe1feb50cf87a433ce5d36e17152ef8
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxBR:T6a+rdOOtEvwDpjNtHPQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-