General
-
Target
2024-05-10_6725ff46a607016299ec28d90d47ea0e_cryptolocker
-
Size
38KB
-
Sample
240510-yjehcsec6v
-
MD5
6725ff46a607016299ec28d90d47ea0e
-
SHA1
e1715611317df32908a35e99053de3cc997fa1e2
-
SHA256
20f16f4d25760080ec695443a22a82b039ab99355f1ca5b6ef14d898efff69e4
-
SHA512
af8718ea043f6e27014f21ec74b09fb0a97ad96869e61de60aaf1edafe3398ed978f0120ef4d2627b1800a9bac8703048f217bfb436a3dc7837b49c695d5e0fc
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F:qDdFJy3QMOtEvwDpjjWMl7Tm
Behavioral task
behavioral1
Sample
2024-05-10_6725ff46a607016299ec28d90d47ea0e_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-10_6725ff46a607016299ec28d90d47ea0e_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-10_6725ff46a607016299ec28d90d47ea0e_cryptolocker
-
Size
38KB
-
MD5
6725ff46a607016299ec28d90d47ea0e
-
SHA1
e1715611317df32908a35e99053de3cc997fa1e2
-
SHA256
20f16f4d25760080ec695443a22a82b039ab99355f1ca5b6ef14d898efff69e4
-
SHA512
af8718ea043f6e27014f21ec74b09fb0a97ad96869e61de60aaf1edafe3398ed978f0120ef4d2627b1800a9bac8703048f217bfb436a3dc7837b49c695d5e0fc
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F:qDdFJy3QMOtEvwDpjjWMl7Tm
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-