General
-
Target
2024-04-30_dae40904d62d344264f1a309396c0d9b_cryptolocker
-
Size
90KB
-
Sample
240430-gbzpwsec3y
-
MD5
dae40904d62d344264f1a309396c0d9b
-
SHA1
538af07acd2b1256efb33948e004d41ccaee7cd9
-
SHA256
a75d09dbc668b1081175137338050b745860143bc87875e48d200f06606ebe6c
-
SHA512
3c8c1168471725fbaa7e8c3984f4e0bc0117e134040fa410f5f9fb6e47792e24cbd0ed93b293e07d3e41a0a64d6276174dcf5aad228a4e13ac6c3945fa020ee0
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdd0:AnBdOOtEvwDpj6zQ
Behavioral task
behavioral1
Sample
2024-04-30_dae40904d62d344264f1a309396c0d9b_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-30_dae40904d62d344264f1a309396c0d9b_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-30_dae40904d62d344264f1a309396c0d9b_cryptolocker
-
Size
90KB
-
MD5
dae40904d62d344264f1a309396c0d9b
-
SHA1
538af07acd2b1256efb33948e004d41ccaee7cd9
-
SHA256
a75d09dbc668b1081175137338050b745860143bc87875e48d200f06606ebe6c
-
SHA512
3c8c1168471725fbaa7e8c3984f4e0bc0117e134040fa410f5f9fb6e47792e24cbd0ed93b293e07d3e41a0a64d6276174dcf5aad228a4e13ac6c3945fa020ee0
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdd0:AnBdOOtEvwDpj6zQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-