General
-
Target
2024-04-30_9ad7d5cddd1de3ce4acf1c39c2d23454_cryptolocker
-
Size
97KB
-
Sample
240430-fz299adh3z
-
MD5
9ad7d5cddd1de3ce4acf1c39c2d23454
-
SHA1
f4a9b310f21f0a6a8226745b5a6b18d9b59bf722
-
SHA256
c8731351811d49e125864887107ed5161a82bbceb69896bfd2ef2c905fb33eb4
-
SHA512
0300084e2bd764863d4f8351bfaeda5fb5d0aa122bcd8aa6c47fce4c4faad823ab4a830b53ad2e5d0a9c5c793a632855fcc42d9b7944c62b65d67c4e429e1d77
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy9H:AnBdOOtEvwDpj6z+
Behavioral task
behavioral1
Sample
2024-04-30_9ad7d5cddd1de3ce4acf1c39c2d23454_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-30_9ad7d5cddd1de3ce4acf1c39c2d23454_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-30_9ad7d5cddd1de3ce4acf1c39c2d23454_cryptolocker
-
Size
97KB
-
MD5
9ad7d5cddd1de3ce4acf1c39c2d23454
-
SHA1
f4a9b310f21f0a6a8226745b5a6b18d9b59bf722
-
SHA256
c8731351811d49e125864887107ed5161a82bbceb69896bfd2ef2c905fb33eb4
-
SHA512
0300084e2bd764863d4f8351bfaeda5fb5d0aa122bcd8aa6c47fce4c4faad823ab4a830b53ad2e5d0a9c5c793a632855fcc42d9b7944c62b65d67c4e429e1d77
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy9H:AnBdOOtEvwDpj6z+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-