General
-
Target
2024-04-23_ec34889d6a6e01cfa5b40046db6a13a3_cryptolocker
-
Size
89KB
-
Sample
240423-zwyx7sbh84
-
MD5
ec34889d6a6e01cfa5b40046db6a13a3
-
SHA1
b39d4340cd8dbd590d75d94e41b22dc768b1943a
-
SHA256
6da5873af29eb96113d3e5aa1739b854d1c21b903a8f1886f12c8d52aac6f803
-
SHA512
2a460a76cacbeb22edb5a5a45b66c6f3c85e804bf0250028bee1ac05aa48f866d95126c03bd4fdc5ecf80860841931fe2bf6f955cbd5ea6a778f3c2d3e481810
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAe:n6a+1SEOtEvwDpjYYvQd2P1
Behavioral task
behavioral1
Sample
2024-04-23_ec34889d6a6e01cfa5b40046db6a13a3_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_ec34889d6a6e01cfa5b40046db6a13a3_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-23_ec34889d6a6e01cfa5b40046db6a13a3_cryptolocker
-
Size
89KB
-
MD5
ec34889d6a6e01cfa5b40046db6a13a3
-
SHA1
b39d4340cd8dbd590d75d94e41b22dc768b1943a
-
SHA256
6da5873af29eb96113d3e5aa1739b854d1c21b903a8f1886f12c8d52aac6f803
-
SHA512
2a460a76cacbeb22edb5a5a45b66c6f3c85e804bf0250028bee1ac05aa48f866d95126c03bd4fdc5ecf80860841931fe2bf6f955cbd5ea6a778f3c2d3e481810
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAe:n6a+1SEOtEvwDpjYYvQd2P1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-