General
-
Target
2024-05-10_e274bf8723420b8bac812fdae79763a3_cryptolocker
-
Size
80KB
-
Sample
240510-jqp54seg47
-
MD5
e274bf8723420b8bac812fdae79763a3
-
SHA1
fd782478e8c3f6d47e06b42fe3dbc3ec3d44660f
-
SHA256
82a11aa4084cd7229fddc20c70b4372b9ed0cbf760c2b06f17cb7c297dbe9109
-
SHA512
52e23c450db42a3c79f075f81f5d8d7a32f3614930939d90c034033a8e8c8a053ddf949d303c11d4915cb049ef53a7d46b7363f9e5f4ff54fea351834ac6ab12
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdx:T6a+rdOOtEvwDpjNtH
Behavioral task
behavioral1
Sample
2024-05-10_e274bf8723420b8bac812fdae79763a3_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_e274bf8723420b8bac812fdae79763a3_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-10_e274bf8723420b8bac812fdae79763a3_cryptolocker
-
Size
80KB
-
MD5
e274bf8723420b8bac812fdae79763a3
-
SHA1
fd782478e8c3f6d47e06b42fe3dbc3ec3d44660f
-
SHA256
82a11aa4084cd7229fddc20c70b4372b9ed0cbf760c2b06f17cb7c297dbe9109
-
SHA512
52e23c450db42a3c79f075f81f5d8d7a32f3614930939d90c034033a8e8c8a053ddf949d303c11d4915cb049ef53a7d46b7363f9e5f4ff54fea351834ac6ab12
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdx:T6a+rdOOtEvwDpjNtH
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-