General
-
Target
2024-04-30_28d8ba601169f7ea83c845ffd04f98c8_cryptolocker
-
Size
38KB
-
Sample
240430-2mvwashf6y
-
MD5
28d8ba601169f7ea83c845ffd04f98c8
-
SHA1
8edaf309f43bae7246f4cd9560d838d9654fca9b
-
SHA256
31bcab401b7b3c4615e8cab3ff297d4f1e9f6b46956f51a32313b06e7dbf03a0
-
SHA512
b285e82e7b4c05acdbf65aac2ba1edcc947fcfcf0be17d7037dbab53eebcd04742646bda6be01a501a9a969dc3963a9c7e5bdba7bd68548f8f1ad1c4ee98104f
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9Y:qDdFJy3QMOtEvwDpjjWMl7Tf
Behavioral task
behavioral1
Sample
2024-04-30_28d8ba601169f7ea83c845ffd04f98c8_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-30_28d8ba601169f7ea83c845ffd04f98c8_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-04-30_28d8ba601169f7ea83c845ffd04f98c8_cryptolocker
-
Size
38KB
-
MD5
28d8ba601169f7ea83c845ffd04f98c8
-
SHA1
8edaf309f43bae7246f4cd9560d838d9654fca9b
-
SHA256
31bcab401b7b3c4615e8cab3ff297d4f1e9f6b46956f51a32313b06e7dbf03a0
-
SHA512
b285e82e7b4c05acdbf65aac2ba1edcc947fcfcf0be17d7037dbab53eebcd04742646bda6be01a501a9a969dc3963a9c7e5bdba7bd68548f8f1ad1c4ee98104f
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9Y:qDdFJy3QMOtEvwDpjjWMl7Tf
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-