General
-
Target
2024-04-24_6a38674344c4726dc244fe318855ace4_cryptolocker
-
Size
49KB
-
Sample
240424-a3wzradb51
-
MD5
6a38674344c4726dc244fe318855ace4
-
SHA1
297ed3d56ba99368c41d44e3717c42cfa71c38dc
-
SHA256
52f2a59cd60b6b57c05868d6c6a0fe497311203e1148f79aef5b34ce3fe4461b
-
SHA512
95d7d0b8f055e9b79dc02acb7ec4e36f39170382ab813f4eaddab65d64cfe5f04d55b36386a2924700430dd8390bfa77255f324ac4209aa3aa0666f21e46d63f
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLtldedHo:xj+VGMOtEvwDpjk/eVo
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_6a38674344c4726dc244fe318855ace4_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-24_6a38674344c4726dc244fe318855ace4_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-24_6a38674344c4726dc244fe318855ace4_cryptolocker
-
Size
49KB
-
MD5
6a38674344c4726dc244fe318855ace4
-
SHA1
297ed3d56ba99368c41d44e3717c42cfa71c38dc
-
SHA256
52f2a59cd60b6b57c05868d6c6a0fe497311203e1148f79aef5b34ce3fe4461b
-
SHA512
95d7d0b8f055e9b79dc02acb7ec4e36f39170382ab813f4eaddab65d64cfe5f04d55b36386a2924700430dd8390bfa77255f324ac4209aa3aa0666f21e46d63f
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLtldedHo:xj+VGMOtEvwDpjk/eVo
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
Detects executables built or packed with MPress PE compressor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-