General
-
Target
2024-04-29_8e1891f40d200dae8a9a9745a7b09d30_cryptolocker
-
Size
89KB
-
Sample
240429-eadd6ahb33
-
MD5
8e1891f40d200dae8a9a9745a7b09d30
-
SHA1
121a54696d0b07cf84a8eeb7f31f0925aac787cb
-
SHA256
b8747794ae2a734a0f4b82b831bd177da65dbea3e72baf3ffd21c7a825c03a05
-
SHA512
4fc6c30b61b3c2ea63d0aab54fe45bb5e524fef48d2b67d9dd21b8078fea7a016a4b81f457d9a65fb25161a3554391c42620c907ceed10cee52561834827f975
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAM:n6a+1SEOtEvwDpjYYvQd2PM
Behavioral task
behavioral1
Sample
2024-04-29_8e1891f40d200dae8a9a9745a7b09d30_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-29_8e1891f40d200dae8a9a9745a7b09d30_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-29_8e1891f40d200dae8a9a9745a7b09d30_cryptolocker
-
Size
89KB
-
MD5
8e1891f40d200dae8a9a9745a7b09d30
-
SHA1
121a54696d0b07cf84a8eeb7f31f0925aac787cb
-
SHA256
b8747794ae2a734a0f4b82b831bd177da65dbea3e72baf3ffd21c7a825c03a05
-
SHA512
4fc6c30b61b3c2ea63d0aab54fe45bb5e524fef48d2b67d9dd21b8078fea7a016a4b81f457d9a65fb25161a3554391c42620c907ceed10cee52561834827f975
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAM:n6a+1SEOtEvwDpjYYvQd2PM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-