General
-
Target
2024-04-30_daf297a17f079f7137a550dea945ded5_cryptolocker
-
Size
71KB
-
Sample
240430-dg3rysbc5x
-
MD5
daf297a17f079f7137a550dea945ded5
-
SHA1
c71a403ae80b9c79f0a7610373e1fdcfa5b1fb48
-
SHA256
ab48e28b3cec4d0afcb40cfc2c4560e2a2835dda2e3ca76f444b646995f4fb66
-
SHA512
9777542b3e365df4073493a4c60aa4fd415016600244bf63ce44852df50ff9cacc6b77823efbdee1fd33c18202bf3d65622e7f2404d9a887b44c0d013941d2a1
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9r:C4Q2c94OtEvwDpj4H8zO
Behavioral task
behavioral1
Sample
2024-04-30_daf297a17f079f7137a550dea945ded5_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-30_daf297a17f079f7137a550dea945ded5_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-30_daf297a17f079f7137a550dea945ded5_cryptolocker
-
Size
71KB
-
MD5
daf297a17f079f7137a550dea945ded5
-
SHA1
c71a403ae80b9c79f0a7610373e1fdcfa5b1fb48
-
SHA256
ab48e28b3cec4d0afcb40cfc2c4560e2a2835dda2e3ca76f444b646995f4fb66
-
SHA512
9777542b3e365df4073493a4c60aa4fd415016600244bf63ce44852df50ff9cacc6b77823efbdee1fd33c18202bf3d65622e7f2404d9a887b44c0d013941d2a1
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9r:C4Q2c94OtEvwDpj4H8zO
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-