General
-
Target
2024-05-09_312f431bde0ef4f1f7585ca5785ee633_cryptolocker
-
Size
73KB
-
Sample
240509-2c7gcaaa7w
-
MD5
312f431bde0ef4f1f7585ca5785ee633
-
SHA1
8a3975cb2ab4a53ec7fad3b7023a547031b5d2be
-
SHA256
3e61b0d61065d7e02da52fecdf5d3897c2cc344a3dcfcfed21171391e969804e
-
SHA512
a14a34a55438aaeff5f90a68fb2fa03bbbbd33d53fc3365e9a6c5013ef1eb1843d91af3dadf0d4b26b476d0405fe723e0f463219ecb51b362e4a5184994a3d55
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVo:1nK6a+qdOOtEvwDpjz
Behavioral task
behavioral1
Sample
2024-05-09_312f431bde0ef4f1f7585ca5785ee633_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-09_312f431bde0ef4f1f7585ca5785ee633_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-09_312f431bde0ef4f1f7585ca5785ee633_cryptolocker
-
Size
73KB
-
MD5
312f431bde0ef4f1f7585ca5785ee633
-
SHA1
8a3975cb2ab4a53ec7fad3b7023a547031b5d2be
-
SHA256
3e61b0d61065d7e02da52fecdf5d3897c2cc344a3dcfcfed21171391e969804e
-
SHA512
a14a34a55438aaeff5f90a68fb2fa03bbbbd33d53fc3365e9a6c5013ef1eb1843d91af3dadf0d4b26b476d0405fe723e0f463219ecb51b362e4a5184994a3d55
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalVo:1nK6a+qdOOtEvwDpjz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-