General
-
Target
2024-05-09_7c226e0ea218645ec7b7c5522621cc96_cryptolocker
-
Size
47KB
-
Sample
240509-r47lbaaa72
-
MD5
7c226e0ea218645ec7b7c5522621cc96
-
SHA1
a6ea6cc02121e62cf3bf32ff96f4843d6b490483
-
SHA256
d18952dd4b556ed95d95f3450608dd0d19b58ad813c4fc858fa564218325f7f7
-
SHA512
e83ae6825bca47998ede233a5e3ce25f12a2dbbdd09fde1bbafd7c06bf583a9561084d5cd2f8b7f290710c0ed5f52f31cc220d800d734d4b22ac7dc2e329cfea
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5H:qmbhXDmjr5MOtEvwDpj5cDtKkQZQT
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_7c226e0ea218645ec7b7c5522621cc96_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-09_7c226e0ea218645ec7b7c5522621cc96_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-09_7c226e0ea218645ec7b7c5522621cc96_cryptolocker
-
Size
47KB
-
MD5
7c226e0ea218645ec7b7c5522621cc96
-
SHA1
a6ea6cc02121e62cf3bf32ff96f4843d6b490483
-
SHA256
d18952dd4b556ed95d95f3450608dd0d19b58ad813c4fc858fa564218325f7f7
-
SHA512
e83ae6825bca47998ede233a5e3ce25f12a2dbbdd09fde1bbafd7c06bf583a9561084d5cd2f8b7f290710c0ed5f52f31cc220d800d734d4b22ac7dc2e329cfea
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5H:qmbhXDmjr5MOtEvwDpj5cDtKkQZQT
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-