General
-
Target
2024-04-24_004622f648504e31a68bf7258545bc0a_cryptolocker
-
Size
38KB
-
Sample
240424-z7v1pahg8s
-
MD5
004622f648504e31a68bf7258545bc0a
-
SHA1
7c96cfa6d228aef1ae8bb7fc99876e71afc181be
-
SHA256
99479864a26c979887031ae37eecd3411c7e2030f4dab8bdfc96d43dc5c3e900
-
SHA512
3c525b47074bc6917c3877062b02617d260d210c2e42574e8fbbb1a350b3380844ac3cecb599abd8b4500fd36e8d398a484b75c8e7bf6d61bbebbee0686befb5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9v:qDdFJy3QMOtEvwDpjjWMl7TQ
Behavioral task
behavioral1
Sample
2024-04-24_004622f648504e31a68bf7258545bc0a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-24_004622f648504e31a68bf7258545bc0a_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-24_004622f648504e31a68bf7258545bc0a_cryptolocker
-
Size
38KB
-
MD5
004622f648504e31a68bf7258545bc0a
-
SHA1
7c96cfa6d228aef1ae8bb7fc99876e71afc181be
-
SHA256
99479864a26c979887031ae37eecd3411c7e2030f4dab8bdfc96d43dc5c3e900
-
SHA512
3c525b47074bc6917c3877062b02617d260d210c2e42574e8fbbb1a350b3380844ac3cecb599abd8b4500fd36e8d398a484b75c8e7bf6d61bbebbee0686befb5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9v:qDdFJy3QMOtEvwDpjjWMl7TQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-