General
-
Target
2024-04-28_39f483a7320cc05283fbd83f9cf75ad0_cryptolocker
-
Size
60KB
-
Sample
240428-e5771sgb44
-
MD5
39f483a7320cc05283fbd83f9cf75ad0
-
SHA1
23d0f2b829a724b48a5d4db9a7c48988386a5ab8
-
SHA256
2861c55d95076a690ea274ff77015dd796eab87792499f63f062f11347c0b8a2
-
SHA512
4aacfe7b4790bc145a2b8deca102ef67553f6b45e6b2cdc15b2ee8076b748fb8026955436e581e83ad9558012f1e92379bf5debe0fae9409ffeea9ecd4843af8
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app1J7G:z6QFElP6n+gKmddpMOtEvwDpj9aYaz7G
Behavioral task
behavioral1
Sample
2024-04-28_39f483a7320cc05283fbd83f9cf75ad0_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-28_39f483a7320cc05283fbd83f9cf75ad0_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-28_39f483a7320cc05283fbd83f9cf75ad0_cryptolocker
-
Size
60KB
-
MD5
39f483a7320cc05283fbd83f9cf75ad0
-
SHA1
23d0f2b829a724b48a5d4db9a7c48988386a5ab8
-
SHA256
2861c55d95076a690ea274ff77015dd796eab87792499f63f062f11347c0b8a2
-
SHA512
4aacfe7b4790bc145a2b8deca102ef67553f6b45e6b2cdc15b2ee8076b748fb8026955436e581e83ad9558012f1e92379bf5debe0fae9409ffeea9ecd4843af8
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5app1J7G:z6QFElP6n+gKmddpMOtEvwDpj9aYaz7G
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-