General
-
Target
2024-05-03_7d8d40322e956e1f5508107305176ca5_cryptolocker
-
Size
38KB
-
Sample
240503-np33ssde3y
-
MD5
7d8d40322e956e1f5508107305176ca5
-
SHA1
d82f034eca8e5405e40f9135fb4f281c75692a5c
-
SHA256
44bfbadef2fafef4c638a8825d44942734bd6354f38fdef0e43cf3b28971e917
-
SHA512
ecb7183c62c3243074ccc297e91904d8ea2fd106b16b415a16601756acf86056cb1f04874272799ac60c02f116dcb1a6b609f7c67f33e43942f607d6d41f95a5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9o:qDdFJy3QMOtEvwDpjjWMl7Tf
Behavioral task
behavioral1
Sample
2024-05-03_7d8d40322e956e1f5508107305176ca5_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-03_7d8d40322e956e1f5508107305176ca5_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-03_7d8d40322e956e1f5508107305176ca5_cryptolocker
-
Size
38KB
-
MD5
7d8d40322e956e1f5508107305176ca5
-
SHA1
d82f034eca8e5405e40f9135fb4f281c75692a5c
-
SHA256
44bfbadef2fafef4c638a8825d44942734bd6354f38fdef0e43cf3b28971e917
-
SHA512
ecb7183c62c3243074ccc297e91904d8ea2fd106b16b415a16601756acf86056cb1f04874272799ac60c02f116dcb1a6b609f7c67f33e43942f607d6d41f95a5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9o:qDdFJy3QMOtEvwDpjjWMl7Tf
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-