General
-
Target
2024-04-27_054b14f60175852c0ebb5c3eef9f00bf_cryptolocker
-
Size
38KB
-
Sample
240427-2aj82aab51
-
MD5
054b14f60175852c0ebb5c3eef9f00bf
-
SHA1
b4f9eb84b53a78d1f24d2f727fe121e2fa2db31e
-
SHA256
a69efb6de03a030bbd0f9411224f1121283e8f5ef4612825571313c468e75676
-
SHA512
a1b20f3b0df57bfe6207c0e003577647af1ed40f7137547e0619efbbfdc17a960d1ca7433899f5cca89c39b7a27d525a34ea2cb1972d4479633948ae00789e8c
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9T:qDdFJy3QMOtEvwDpjjWMl7TE
Behavioral task
behavioral1
Sample
2024-04-27_054b14f60175852c0ebb5c3eef9f00bf_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-27_054b14f60175852c0ebb5c3eef9f00bf_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-27_054b14f60175852c0ebb5c3eef9f00bf_cryptolocker
-
Size
38KB
-
MD5
054b14f60175852c0ebb5c3eef9f00bf
-
SHA1
b4f9eb84b53a78d1f24d2f727fe121e2fa2db31e
-
SHA256
a69efb6de03a030bbd0f9411224f1121283e8f5ef4612825571313c468e75676
-
SHA512
a1b20f3b0df57bfe6207c0e003577647af1ed40f7137547e0619efbbfdc17a960d1ca7433899f5cca89c39b7a27d525a34ea2cb1972d4479633948ae00789e8c
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9T:qDdFJy3QMOtEvwDpjjWMl7TE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-