General
-
Target
2024-05-05_74ba6c6df3e7cb54fef3011d8532f585_cryptolocker
-
Size
93KB
-
Sample
240505-e7mzvsfb5s
-
MD5
74ba6c6df3e7cb54fef3011d8532f585
-
SHA1
2e7d9e5692f7bb17637239e298d602ca497e8eae
-
SHA256
67ee4e4ee2a875da9414243af1f1cdec96fbd8e78dd949a65c326d6374fd78c5
-
SHA512
0da1354b9d4b7ef1ec230a4bb75d0e629ad00826b0b187c0118ab94fa4057b15b56637213c2f4d46e204f5a16e9b8ca7d54732b3223ffad1a553ed3007953bd3
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/X:zCsanOtEvwDpjBX
Behavioral task
behavioral1
Sample
2024-05-05_74ba6c6df3e7cb54fef3011d8532f585_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-05_74ba6c6df3e7cb54fef3011d8532f585_cryptolocker.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-05_74ba6c6df3e7cb54fef3011d8532f585_cryptolocker
-
Size
93KB
-
MD5
74ba6c6df3e7cb54fef3011d8532f585
-
SHA1
2e7d9e5692f7bb17637239e298d602ca497e8eae
-
SHA256
67ee4e4ee2a875da9414243af1f1cdec96fbd8e78dd949a65c326d6374fd78c5
-
SHA512
0da1354b9d4b7ef1ec230a4bb75d0e629ad00826b0b187c0118ab94fa4057b15b56637213c2f4d46e204f5a16e9b8ca7d54732b3223ffad1a553ed3007953bd3
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/X:zCsanOtEvwDpjBX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-