General
-
Target
2024-05-02_9fe6808352829914d905526c8749fe02_cryptolocker
-
Size
71KB
-
Sample
240502-c1mpeaef2v
-
MD5
9fe6808352829914d905526c8749fe02
-
SHA1
daa52b7dfb712f6b9e4cd75e1c1d30d6eed8495e
-
SHA256
2b349cbb904d67dc268788d199e175b941dc1e2746b96a8836d2f15b757c06b6
-
SHA512
58af9de5cb0cacbd15dcbf159400b1131eb6009dfd9d35774cd2ac7b200747890cb50246f19ae9c5df70ccac99816db690965db83e87e2db6e1dccc361fa0317
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95o:C4Q2c94OtEvwDpj4H8zX
Behavioral task
behavioral1
Sample
2024-05-02_9fe6808352829914d905526c8749fe02_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_9fe6808352829914d905526c8749fe02_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-02_9fe6808352829914d905526c8749fe02_cryptolocker
-
Size
71KB
-
MD5
9fe6808352829914d905526c8749fe02
-
SHA1
daa52b7dfb712f6b9e4cd75e1c1d30d6eed8495e
-
SHA256
2b349cbb904d67dc268788d199e175b941dc1e2746b96a8836d2f15b757c06b6
-
SHA512
58af9de5cb0cacbd15dcbf159400b1131eb6009dfd9d35774cd2ac7b200747890cb50246f19ae9c5df70ccac99816db690965db83e87e2db6e1dccc361fa0317
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95o:C4Q2c94OtEvwDpj4H8zX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-