General
-
Target
2024-05-10_1e291b1247b602e98c69bde0ac82c291_cryptolocker
-
Size
68KB
-
Sample
240510-d3xg3agd8x
-
MD5
1e291b1247b602e98c69bde0ac82c291
-
SHA1
d64863e6d699ddcbaf0a1fb908a888da78278086
-
SHA256
4699bdf5776c78c60680b2cb595501322439ae6c74ac686123bfe37ad593c98b
-
SHA512
dca366a046c8caad58e2f1cf60942df374ed27d6c170c1f667c63130fb3871827138c11bc8742d6c65698579d3c31e26bde139350918d32d38190cf10601333c
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQApkB:78SEOtEvwDpjWYvQd2Pa
Behavioral task
behavioral1
Sample
2024-05-10_1e291b1247b602e98c69bde0ac82c291_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_1e291b1247b602e98c69bde0ac82c291_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-10_1e291b1247b602e98c69bde0ac82c291_cryptolocker
-
Size
68KB
-
MD5
1e291b1247b602e98c69bde0ac82c291
-
SHA1
d64863e6d699ddcbaf0a1fb908a888da78278086
-
SHA256
4699bdf5776c78c60680b2cb595501322439ae6c74ac686123bfe37ad593c98b
-
SHA512
dca366a046c8caad58e2f1cf60942df374ed27d6c170c1f667c63130fb3871827138c11bc8742d6c65698579d3c31e26bde139350918d32d38190cf10601333c
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQApkB:78SEOtEvwDpjWYvQd2Pa
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-