General
-
Target
2024-05-10_1a77fc7f4568214a23e1e10d17c4470e_cryptolocker
-
Size
39KB
-
Sample
240510-vacevsae94
-
MD5
1a77fc7f4568214a23e1e10d17c4470e
-
SHA1
0de721ac1e127939e11fe8be1ecf8f2c3579cc47
-
SHA256
2b67c44a0b56432c2c2c49e67cffe9fab91a93d381aa4d05a222ed1770dd0704
-
SHA512
e7196311a2e85a4d7745d97e911e043a67744529166ecb8e87a908125fd67eb7a6525b6251c01e4cae400a796f3f8b928646ec89dca21e5686953fd6c03a6df4
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYA:qDdFJy3QMOtEvwDpjjWMl7Td
Behavioral task
behavioral1
Sample
2024-05-10_1a77fc7f4568214a23e1e10d17c4470e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_1a77fc7f4568214a23e1e10d17c4470e_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-10_1a77fc7f4568214a23e1e10d17c4470e_cryptolocker
-
Size
39KB
-
MD5
1a77fc7f4568214a23e1e10d17c4470e
-
SHA1
0de721ac1e127939e11fe8be1ecf8f2c3579cc47
-
SHA256
2b67c44a0b56432c2c2c49e67cffe9fab91a93d381aa4d05a222ed1770dd0704
-
SHA512
e7196311a2e85a4d7745d97e911e043a67744529166ecb8e87a908125fd67eb7a6525b6251c01e4cae400a796f3f8b928646ec89dca21e5686953fd6c03a6df4
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYA:qDdFJy3QMOtEvwDpjjWMl7Td
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-