General
-
Target
2024-05-02_5289ebf8fd5313de28cbb001119c7e27_cryptolocker
-
Size
70KB
-
Sample
240502-xjebxsga23
-
MD5
5289ebf8fd5313de28cbb001119c7e27
-
SHA1
94b68b73b5316b840a97978765d3148050931d2c
-
SHA256
a7af0535d8a9e645d67c6ee9beb2e25efbec04fbe4afcf235e62ac4dfd2c914f
-
SHA512
efcb42f92f4e376a218dfcaa0296ce646fe8fb8cd33d8956f479a583efdc61da20d9e3383ebea3cfddc49b5a85b1aabbc48f907f910a05b5e6781bf553e981f3
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9J:C4Q2c94OtEvwDpj4H8zA
Behavioral task
behavioral1
Sample
2024-05-02_5289ebf8fd5313de28cbb001119c7e27_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-02_5289ebf8fd5313de28cbb001119c7e27_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-02_5289ebf8fd5313de28cbb001119c7e27_cryptolocker
-
Size
70KB
-
MD5
5289ebf8fd5313de28cbb001119c7e27
-
SHA1
94b68b73b5316b840a97978765d3148050931d2c
-
SHA256
a7af0535d8a9e645d67c6ee9beb2e25efbec04fbe4afcf235e62ac4dfd2c914f
-
SHA512
efcb42f92f4e376a218dfcaa0296ce646fe8fb8cd33d8956f479a583efdc61da20d9e3383ebea3cfddc49b5a85b1aabbc48f907f910a05b5e6781bf553e981f3
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9J:C4Q2c94OtEvwDpj4H8zA
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-