General
-
Target
2024-05-10_77adecd9ce07503af0a625333c152251_cryptolocker
-
Size
39KB
-
Sample
240510-ykejrahd92
-
MD5
77adecd9ce07503af0a625333c152251
-
SHA1
7aa5e0026cbf7a38d94957b6ac7e1db7e682d69c
-
SHA256
13da9fe90c93532bc45fc74748a8e7a45cb46afc8245e38fddc850858096cef5
-
SHA512
546c83519908a7225c67ec5eca1ec382719e3a377da96f0298b113059447597ad90f82cb6e7e29c906958cabc5482b02c69dab0e5d3d6779525db2ab06bf0731
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYD:qDdFJy3QMOtEvwDpjjWMl7TS
Behavioral task
behavioral1
Sample
2024-05-10_77adecd9ce07503af0a625333c152251_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_77adecd9ce07503af0a625333c152251_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-10_77adecd9ce07503af0a625333c152251_cryptolocker
-
Size
39KB
-
MD5
77adecd9ce07503af0a625333c152251
-
SHA1
7aa5e0026cbf7a38d94957b6ac7e1db7e682d69c
-
SHA256
13da9fe90c93532bc45fc74748a8e7a45cb46afc8245e38fddc850858096cef5
-
SHA512
546c83519908a7225c67ec5eca1ec382719e3a377da96f0298b113059447597ad90f82cb6e7e29c906958cabc5482b02c69dab0e5d3d6779525db2ab06bf0731
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYD:qDdFJy3QMOtEvwDpjjWMl7TS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-