General
-
Target
2024-05-09_73f0367beb66d47825bb3cb4624de96a_cryptolocker
-
Size
39KB
-
Sample
240509-x56y3aah3w
-
MD5
73f0367beb66d47825bb3cb4624de96a
-
SHA1
c903936bcf74482df012d347afffbc119da60de0
-
SHA256
e0359200bbd9beb7a6d4a28d16a0bfd53c6cdab5963b5eddff44e89cc37ad63d
-
SHA512
45c3853b475be27ed411f8c930b43bc44c140f3040b6867e38161f6abfba11b366ce6e692095bd7491f53094cdc9901200cc784772b4846036c345e9386aec61
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYau:qDdFJy3QMOtEvwDpjjWMl7Tdu
Behavioral task
behavioral1
Sample
2024-05-09_73f0367beb66d47825bb3cb4624de96a_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-09_73f0367beb66d47825bb3cb4624de96a_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-09_73f0367beb66d47825bb3cb4624de96a_cryptolocker
-
Size
39KB
-
MD5
73f0367beb66d47825bb3cb4624de96a
-
SHA1
c903936bcf74482df012d347afffbc119da60de0
-
SHA256
e0359200bbd9beb7a6d4a28d16a0bfd53c6cdab5963b5eddff44e89cc37ad63d
-
SHA512
45c3853b475be27ed411f8c930b43bc44c140f3040b6867e38161f6abfba11b366ce6e692095bd7491f53094cdc9901200cc784772b4846036c345e9386aec61
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYau:qDdFJy3QMOtEvwDpjjWMl7Tdu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-