General
-
Target
2024-04-26_0f759d981f4921529f09ec7679a8f92c_cryptolocker
-
Size
88KB
-
Sample
240426-w175wsac9y
-
MD5
0f759d981f4921529f09ec7679a8f92c
-
SHA1
0c9d7a0880527584aea1767213888242ee0e488e
-
SHA256
2edb7351f79595a760b5056e05de79e098385aa99990a9d9469d658b582ea95c
-
SHA512
cc65520d424945125e3c9c9f55fc87b24616fdf58114f1920d46801b2bc86554b5fb3e324adab63a17e706cb5fb5a2efc8327a7df472655056e27c1c5f73d4b3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIt:AnBdOOtEvwDpj6zc
Behavioral task
behavioral1
Sample
2024-04-26_0f759d981f4921529f09ec7679a8f92c_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-26_0f759d981f4921529f09ec7679a8f92c_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-26_0f759d981f4921529f09ec7679a8f92c_cryptolocker
-
Size
88KB
-
MD5
0f759d981f4921529f09ec7679a8f92c
-
SHA1
0c9d7a0880527584aea1767213888242ee0e488e
-
SHA256
2edb7351f79595a760b5056e05de79e098385aa99990a9d9469d658b582ea95c
-
SHA512
cc65520d424945125e3c9c9f55fc87b24616fdf58114f1920d46801b2bc86554b5fb3e324adab63a17e706cb5fb5a2efc8327a7df472655056e27c1c5f73d4b3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIt:AnBdOOtEvwDpj6zc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-