General
-
Target
2024-05-10_5c16e82bc8cbbfcec6503ff42e63168d_cryptolocker
-
Size
89KB
-
Sample
240510-f6c9psha35
-
MD5
5c16e82bc8cbbfcec6503ff42e63168d
-
SHA1
7dd93608df35d9de1bb8a6018353f3183f75bbb5
-
SHA256
eda782e734e65ecd16e094c66f90b18957553e748949e6946b7cf858cbe58eb4
-
SHA512
e56c3102c9071f5662d104890afc4d553b1e76733066fb077f19d4a285bad79eeba6d259d3450062b19ec63fce25c6db27093e725b523523ab6cdfaecd8c1695
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIi+:AnBdOOtEvwDpj6zs
Behavioral task
behavioral1
Sample
2024-05-10_5c16e82bc8cbbfcec6503ff42e63168d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_5c16e82bc8cbbfcec6503ff42e63168d_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-10_5c16e82bc8cbbfcec6503ff42e63168d_cryptolocker
-
Size
89KB
-
MD5
5c16e82bc8cbbfcec6503ff42e63168d
-
SHA1
7dd93608df35d9de1bb8a6018353f3183f75bbb5
-
SHA256
eda782e734e65ecd16e094c66f90b18957553e748949e6946b7cf858cbe58eb4
-
SHA512
e56c3102c9071f5662d104890afc4d553b1e76733066fb077f19d4a285bad79eeba6d259d3450062b19ec63fce25c6db27093e725b523523ab6cdfaecd8c1695
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIi+:AnBdOOtEvwDpj6zs
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-