General
-
Target
2024-04-30_5dfffa0e6b477b33db6949f0378fb8cf_cryptolocker
-
Size
97KB
-
Sample
240430-c6zwxsac53
-
MD5
5dfffa0e6b477b33db6949f0378fb8cf
-
SHA1
9b7fc32a7555e375665f87be4ab31a9fac65705c
-
SHA256
fe803f968d7bf4fa05f7d119a2ab969dd26c27747829d6232bbcd835b0b9388c
-
SHA512
784eef14f114708c4c3d60773bfda6a17832e07a215fccb469be1b00361addd149dbdb3c51bd7fa114ad7723305e644d892634d09adc489010d18df2d063d588
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy95:AnBdOOtEvwDpj6zU
Behavioral task
behavioral1
Sample
2024-04-30_5dfffa0e6b477b33db6949f0378fb8cf_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-30_5dfffa0e6b477b33db6949f0378fb8cf_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-30_5dfffa0e6b477b33db6949f0378fb8cf_cryptolocker
-
Size
97KB
-
MD5
5dfffa0e6b477b33db6949f0378fb8cf
-
SHA1
9b7fc32a7555e375665f87be4ab31a9fac65705c
-
SHA256
fe803f968d7bf4fa05f7d119a2ab969dd26c27747829d6232bbcd835b0b9388c
-
SHA512
784eef14f114708c4c3d60773bfda6a17832e07a215fccb469be1b00361addd149dbdb3c51bd7fa114ad7723305e644d892634d09adc489010d18df2d063d588
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy95:AnBdOOtEvwDpj6zU
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-