General
-
Target
2024-04-27_1d76cd92b70f793c614ba5270b41c054_cryptolocker
-
Size
38KB
-
Sample
240427-ctkapshh9v
-
MD5
1d76cd92b70f793c614ba5270b41c054
-
SHA1
8fd7468a09d95ff095fe49800ac1affdc7da8029
-
SHA256
9bf399c0e13d50396d6dd763b8ea99420fa3a10f73a308f4162455405da65621
-
SHA512
4aad0c18e9b15d239d89870dd79f138f84e770376f37bfb881b9c1233411ed8a00dbad03da83e2d89a920ef7788f0bfd89e764d69fcbe407ba9d8125995f87ce
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY7:qDdFJy3QMOtEvwDpjjWMl7Ta
Behavioral task
behavioral1
Sample
2024-04-27_1d76cd92b70f793c614ba5270b41c054_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_1d76cd92b70f793c614ba5270b41c054_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-27_1d76cd92b70f793c614ba5270b41c054_cryptolocker
-
Size
38KB
-
MD5
1d76cd92b70f793c614ba5270b41c054
-
SHA1
8fd7468a09d95ff095fe49800ac1affdc7da8029
-
SHA256
9bf399c0e13d50396d6dd763b8ea99420fa3a10f73a308f4162455405da65621
-
SHA512
4aad0c18e9b15d239d89870dd79f138f84e770376f37bfb881b9c1233411ed8a00dbad03da83e2d89a920ef7788f0bfd89e764d69fcbe407ba9d8125995f87ce
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY7:qDdFJy3QMOtEvwDpjjWMl7Ta
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-