General
-
Target
2024-05-09_8d405d3a444a66914e75d0fa72b780ca_cryptolocker
-
Size
68KB
-
Sample
240509-fc4vkaeb73
-
MD5
8d405d3a444a66914e75d0fa72b780ca
-
SHA1
b57952cf4082b723eac08029e33a66a25c05e058
-
SHA256
0e985c96bd3ca469fa79cebcabce706dd5d49f714f534908e44ef4bf0ffb5f31
-
SHA512
1fc6e48d296da55acfa8ed956f29bc2b6c4f7ad6780789eb4a6829ff1a23acd83db2ed417f8180c324cc3b0bb71e764e133f203af3d8169f3703d4a7ef48eaec
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1Pm:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAm
Behavioral task
behavioral1
Sample
2024-05-09_8d405d3a444a66914e75d0fa72b780ca_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-09_8d405d3a444a66914e75d0fa72b780ca_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-09_8d405d3a444a66914e75d0fa72b780ca_cryptolocker
-
Size
68KB
-
MD5
8d405d3a444a66914e75d0fa72b780ca
-
SHA1
b57952cf4082b723eac08029e33a66a25c05e058
-
SHA256
0e985c96bd3ca469fa79cebcabce706dd5d49f714f534908e44ef4bf0ffb5f31
-
SHA512
1fc6e48d296da55acfa8ed956f29bc2b6c4f7ad6780789eb4a6829ff1a23acd83db2ed417f8180c324cc3b0bb71e764e133f203af3d8169f3703d4a7ef48eaec
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1Pm:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAm
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-