General
-
Target
2024-05-10_22f4dfcf36ce8d458fc56b29e9ab5453_cryptolocker
-
Size
88KB
-
Sample
240510-nkffyafa46
-
MD5
22f4dfcf36ce8d458fc56b29e9ab5453
-
SHA1
36b51fd969f4a58bc4278f0b7834f9a20c26d107
-
SHA256
7c1765aeaa16e4d4855986939edede53234b4e2cb828ef64614608fa50a40707
-
SHA512
374a8bcb6944e79568c25a4ee01f813e96946227edf0b86848de5c588e65d2e9b77b2dda1a26be587ca2211cf39f636987f49db0023013867dadad6fff8d1eaa
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODyE:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgN
Behavioral task
behavioral1
Sample
2024-05-10_22f4dfcf36ce8d458fc56b29e9ab5453_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_22f4dfcf36ce8d458fc56b29e9ab5453_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-10_22f4dfcf36ce8d458fc56b29e9ab5453_cryptolocker
-
Size
88KB
-
MD5
22f4dfcf36ce8d458fc56b29e9ab5453
-
SHA1
36b51fd969f4a58bc4278f0b7834f9a20c26d107
-
SHA256
7c1765aeaa16e4d4855986939edede53234b4e2cb828ef64614608fa50a40707
-
SHA512
374a8bcb6944e79568c25a4ee01f813e96946227edf0b86848de5c588e65d2e9b77b2dda1a26be587ca2211cf39f636987f49db0023013867dadad6fff8d1eaa
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODyE:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgN
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-