General
-
Target
2024-05-01_06ecadddd569cfcf0d5f58d31f9c588d_cryptolocker
-
Size
55KB
-
Sample
240501-sslp5scb24
-
MD5
06ecadddd569cfcf0d5f58d31f9c588d
-
SHA1
b10e6b3d2740297dd095f6eb933b67cd80771137
-
SHA256
1c3fd44107f8b1127135f44431ca2fd1884543501719d38870426646ade2af54
-
SHA512
ed69ec8b58c37f0fc227df666fcab60e2e16383e890cbc3c77a177f7db9b44a08427727d3c69ce5081a53302d3e4647fa9d0d849121e8655b919c47f98f3fb16
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+W:bP9g/xtCS3Dxx0JW
Behavioral task
behavioral1
Sample
2024-05-01_06ecadddd569cfcf0d5f58d31f9c588d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-01_06ecadddd569cfcf0d5f58d31f9c588d_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-01_06ecadddd569cfcf0d5f58d31f9c588d_cryptolocker
-
Size
55KB
-
MD5
06ecadddd569cfcf0d5f58d31f9c588d
-
SHA1
b10e6b3d2740297dd095f6eb933b67cd80771137
-
SHA256
1c3fd44107f8b1127135f44431ca2fd1884543501719d38870426646ade2af54
-
SHA512
ed69ec8b58c37f0fc227df666fcab60e2e16383e890cbc3c77a177f7db9b44a08427727d3c69ce5081a53302d3e4647fa9d0d849121e8655b919c47f98f3fb16
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+W:bP9g/xtCS3Dxx0JW
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-