General
-
Target
2024-05-04_17249223f9bbea1eae01d4bf967bbedf_cryptolocker
-
Size
39KB
-
Sample
240504-yvex9scg22
-
MD5
17249223f9bbea1eae01d4bf967bbedf
-
SHA1
84c601f859a4c768b98a584e18a65a91c71b8a04
-
SHA256
baa781e5640b2d9cff4db8989aa3b7b401c486ea88a986e2f4806ffc77994104
-
SHA512
c4fc416f6d91c346b0cfdc4b286e39aeb7593161998f06692aaceeeb918affc8b12ad92a5601de2c152ad1506bbd931580fbf33172700b19c13c8a237ec31a5d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaE:qDdFJy3QMOtEvwDpjjWMl7TdE
Behavioral task
behavioral1
Sample
2024-05-04_17249223f9bbea1eae01d4bf967bbedf_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_17249223f9bbea1eae01d4bf967bbedf_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-04_17249223f9bbea1eae01d4bf967bbedf_cryptolocker
-
Size
39KB
-
MD5
17249223f9bbea1eae01d4bf967bbedf
-
SHA1
84c601f859a4c768b98a584e18a65a91c71b8a04
-
SHA256
baa781e5640b2d9cff4db8989aa3b7b401c486ea88a986e2f4806ffc77994104
-
SHA512
c4fc416f6d91c346b0cfdc4b286e39aeb7593161998f06692aaceeeb918affc8b12ad92a5601de2c152ad1506bbd931580fbf33172700b19c13c8a237ec31a5d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaE:qDdFJy3QMOtEvwDpjjWMl7TdE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-