General
-
Target
2024-04-25_17b823801b54114b8d73b157eb8b0dbe_cryptolocker
-
Size
82KB
-
Sample
240425-nyndpsac6w
-
MD5
17b823801b54114b8d73b157eb8b0dbe
-
SHA1
9b7be5136bed8f1f1f216e11ccf1c3d1a89e3bce
-
SHA256
51f9828ce1e9812e3e9cda6ddce8234735e47c155693bedb2e1d9f16f1c3453c
-
SHA512
edefc0ef8bacaf85746ef283b5a7823402eea01e1b10f29160c7b0c6beb1bd95673a862fd0c6cf0615b38c02eb16f68e6425d4f40236a8786001c52899c35b25
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0b:T6a+rdOOtEvwDpjNt8
Behavioral task
behavioral1
Sample
2024-04-25_17b823801b54114b8d73b157eb8b0dbe_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_17b823801b54114b8d73b157eb8b0dbe_cryptolocker.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-25_17b823801b54114b8d73b157eb8b0dbe_cryptolocker
-
Size
82KB
-
MD5
17b823801b54114b8d73b157eb8b0dbe
-
SHA1
9b7be5136bed8f1f1f216e11ccf1c3d1a89e3bce
-
SHA256
51f9828ce1e9812e3e9cda6ddce8234735e47c155693bedb2e1d9f16f1c3453c
-
SHA512
edefc0ef8bacaf85746ef283b5a7823402eea01e1b10f29160c7b0c6beb1bd95673a862fd0c6cf0615b38c02eb16f68e6425d4f40236a8786001c52899c35b25
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0b:T6a+rdOOtEvwDpjNt8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-