General
-
Target
2024-05-02_c786da7a5db5b400e89764aeb9e8baac_cryptolocker
-
Size
68KB
-
Sample
240502-w4z9fsfg46
-
MD5
c786da7a5db5b400e89764aeb9e8baac
-
SHA1
6516e70356f5b022bbcdf37a64a1288496f5542d
-
SHA256
04bbb6fb2e096b870cdcd6116f609a37d8e55574b4f9e99f747906f772650007
-
SHA512
46c978269b0ce1c4a0dd59beda2e2b32d22fce4c94ef2a198c8948ce6823cbb2462d20187f2741fe473c29e0dacf27f26d3e20c99bed3ba9f12dee3e5b72f5c1
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAeJ:78SEOtEvwDpjWYvQd2P8
Behavioral task
behavioral1
Sample
2024-05-02_c786da7a5db5b400e89764aeb9e8baac_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-02_c786da7a5db5b400e89764aeb9e8baac_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-02_c786da7a5db5b400e89764aeb9e8baac_cryptolocker
-
Size
68KB
-
MD5
c786da7a5db5b400e89764aeb9e8baac
-
SHA1
6516e70356f5b022bbcdf37a64a1288496f5542d
-
SHA256
04bbb6fb2e096b870cdcd6116f609a37d8e55574b4f9e99f747906f772650007
-
SHA512
46c978269b0ce1c4a0dd59beda2e2b32d22fce4c94ef2a198c8948ce6823cbb2462d20187f2741fe473c29e0dacf27f26d3e20c99bed3ba9f12dee3e5b72f5c1
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAeJ:78SEOtEvwDpjWYvQd2P8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-