General
-
Target
2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker
-
Size
80KB
-
Sample
240504-yn2hpahd2y
-
MD5
dfa1d080376934e083d3f3552225d828
-
SHA1
f6a01d8b2c9acb4f8f62649b144da8d692e84255
-
SHA256
bfb9d8d0681e195617afb4d6e51711516277a27cd61ad1a9b07912708a4cd621
-
SHA512
a21a70f1fc4e9d19f2c809fd7b323e1845b37762a41d346418836c5201098a463b87a3bbaf29528a9b513c5847273a63f793734e3636da813b5f7f00ba759659
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdP:T6a+rdOOtEvwDpjNtJ
Behavioral task
behavioral1
Sample
2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-04_dfa1d080376934e083d3f3552225d828_cryptolocker
-
Size
80KB
-
MD5
dfa1d080376934e083d3f3552225d828
-
SHA1
f6a01d8b2c9acb4f8f62649b144da8d692e84255
-
SHA256
bfb9d8d0681e195617afb4d6e51711516277a27cd61ad1a9b07912708a4cd621
-
SHA512
a21a70f1fc4e9d19f2c809fd7b323e1845b37762a41d346418836c5201098a463b87a3bbaf29528a9b513c5847273a63f793734e3636da813b5f7f00ba759659
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdP:T6a+rdOOtEvwDpjNtJ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-