General
-
Target
2024-04-29_ed16157ea6ee0bf39aa7436ca4916d39_cryptolocker
-
Size
50KB
-
Sample
240429-c7nkaafh42
-
MD5
ed16157ea6ee0bf39aa7436ca4916d39
-
SHA1
e58682fd56e91e71bfd4685fdcba3cba65306562
-
SHA256
bbd3efce897c8fbec057476c6f57bbf9f05f71c0a22203b01accabb8115ae354
-
SHA512
df1365034e1917bd10d0c7fee3d2eddffc84c5e5ba79337ea475cafc9ab402826ee38aacfa875fc1cabb60071a467c8d30d269086d4176b62a39c1449bdaa18e
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccL:qmbhXDmjr5MOtEvwDpj5cDtKkQZQt
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_ed16157ea6ee0bf39aa7436ca4916d39_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-29_ed16157ea6ee0bf39aa7436ca4916d39_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-04-29_ed16157ea6ee0bf39aa7436ca4916d39_cryptolocker
-
Size
50KB
-
MD5
ed16157ea6ee0bf39aa7436ca4916d39
-
SHA1
e58682fd56e91e71bfd4685fdcba3cba65306562
-
SHA256
bbd3efce897c8fbec057476c6f57bbf9f05f71c0a22203b01accabb8115ae354
-
SHA512
df1365034e1917bd10d0c7fee3d2eddffc84c5e5ba79337ea475cafc9ab402826ee38aacfa875fc1cabb60071a467c8d30d269086d4176b62a39c1449bdaa18e
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccL:qmbhXDmjr5MOtEvwDpj5cDtKkQZQt
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-