General
-
Target
2024-04-24_6e03f955ea4d8277684181d6b7009af9_cryptolocker
-
Size
38KB
-
Sample
240424-1a4f8shh5t
-
MD5
6e03f955ea4d8277684181d6b7009af9
-
SHA1
71ca7c0f936c224d956fcb69f0a74ada1afb22df
-
SHA256
9ddd5385b7a509b84b41483f92df60cbebc36fff3b72edfe962e1e89c5f8580d
-
SHA512
f634758df40aeaa8fc6284530512dfd3102cb381fbfcf5fc4750dc67b888fa561023752d3765dbff1f9090d920288e5fb89e0cea090e03e2068cb145d3f8fd6b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYanE:qDdFJy3QMOtEvwDpjjWMl7TdnE
Behavioral task
behavioral1
Sample
2024-04-24_6e03f955ea4d8277684181d6b7009af9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-24_6e03f955ea4d8277684181d6b7009af9_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-24_6e03f955ea4d8277684181d6b7009af9_cryptolocker
-
Size
38KB
-
MD5
6e03f955ea4d8277684181d6b7009af9
-
SHA1
71ca7c0f936c224d956fcb69f0a74ada1afb22df
-
SHA256
9ddd5385b7a509b84b41483f92df60cbebc36fff3b72edfe962e1e89c5f8580d
-
SHA512
f634758df40aeaa8fc6284530512dfd3102cb381fbfcf5fc4750dc67b888fa561023752d3765dbff1f9090d920288e5fb89e0cea090e03e2068cb145d3f8fd6b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYanE:qDdFJy3QMOtEvwDpjjWMl7TdnE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-