General
-
Target
2024-05-02_a8156eb05bb173b65d825e44f55f6d53_cryptolocker
-
Size
95KB
-
Sample
240502-vdbyhach8y
-
MD5
a8156eb05bb173b65d825e44f55f6d53
-
SHA1
72a983e2eea8a80dedf618b5718ec0198f85ae76
-
SHA256
07f03618903dd6c51443ad90cd323e11bb93d4a2e53b47a9e96f5291ff23d3db
-
SHA512
e50587654fd707bc2cf92dd848c52792e0f7af57a501f8ada88dd35a3046f5ff19a56cb52b66d295e6669eda30cfd594d98c506402911f8d224db09e596ea12c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYIc:AnBdOOtEvwDpj6z/
Behavioral task
behavioral1
Sample
2024-05-02_a8156eb05bb173b65d825e44f55f6d53_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-02_a8156eb05bb173b65d825e44f55f6d53_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-02_a8156eb05bb173b65d825e44f55f6d53_cryptolocker
-
Size
95KB
-
MD5
a8156eb05bb173b65d825e44f55f6d53
-
SHA1
72a983e2eea8a80dedf618b5718ec0198f85ae76
-
SHA256
07f03618903dd6c51443ad90cd323e11bb93d4a2e53b47a9e96f5291ff23d3db
-
SHA512
e50587654fd707bc2cf92dd848c52792e0f7af57a501f8ada88dd35a3046f5ff19a56cb52b66d295e6669eda30cfd594d98c506402911f8d224db09e596ea12c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYIc:AnBdOOtEvwDpj6z/
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-