General
-
Target
2024-05-08_e0f38d09b3eef31310086440a1698397_cryptolocker
-
Size
39KB
-
Sample
240508-yrdk2ach2t
-
MD5
e0f38d09b3eef31310086440a1698397
-
SHA1
94fc460192f0480a678eb7f9bafdf0cdd4a33a51
-
SHA256
1b0d74694b1571de199946f9d53917e0a1963b57a82a8f235794ca36ec8ebb23
-
SHA512
f14e2d85994000757307ca0b5c307ddf44e5c119d8c695a7058a706a1717c17b323236d6b4abad76149c1f1632ef190e4da413717407465f7e03e161ef50d25d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaaUc:qDdFJy3QMOtEvwDpjjWMl7TdaUc
Behavioral task
behavioral1
Sample
2024-05-08_e0f38d09b3eef31310086440a1698397_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-08_e0f38d09b3eef31310086440a1698397_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-08_e0f38d09b3eef31310086440a1698397_cryptolocker
-
Size
39KB
-
MD5
e0f38d09b3eef31310086440a1698397
-
SHA1
94fc460192f0480a678eb7f9bafdf0cdd4a33a51
-
SHA256
1b0d74694b1571de199946f9d53917e0a1963b57a82a8f235794ca36ec8ebb23
-
SHA512
f14e2d85994000757307ca0b5c307ddf44e5c119d8c695a7058a706a1717c17b323236d6b4abad76149c1f1632ef190e4da413717407465f7e03e161ef50d25d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaaUc:qDdFJy3QMOtEvwDpjjWMl7TdaUc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-