General
-
Target
2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker
-
Size
89KB
-
Sample
240510-b112csee59
-
MD5
f1acbe66ca726fa24aa67c884f1b189d
-
SHA1
22efb1e65a59d24fd81598d6124cb55f6d594071
-
SHA256
6cf2c5a519ea2466a81d9be0059172a103134e75385ed13dd64077985751f75f
-
SHA512
da2a847472adb4ea7e8229bedf555c9e1ef471f4757f3fd603b690085d8af5b247269b065a7aef690efc80545f916e92834b408dc5dba6b360b6f2c43b60e8b5
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Nt:n6a+1SEOtEvwDpjYYvQd2Po
Behavioral task
behavioral1
Sample
2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-10_f1acbe66ca726fa24aa67c884f1b189d_cryptolocker
-
Size
89KB
-
MD5
f1acbe66ca726fa24aa67c884f1b189d
-
SHA1
22efb1e65a59d24fd81598d6124cb55f6d594071
-
SHA256
6cf2c5a519ea2466a81d9be0059172a103134e75385ed13dd64077985751f75f
-
SHA512
da2a847472adb4ea7e8229bedf555c9e1ef471f4757f3fd603b690085d8af5b247269b065a7aef690efc80545f916e92834b408dc5dba6b360b6f2c43b60e8b5
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Nt:n6a+1SEOtEvwDpjYYvQd2Po
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-