General
-
Target
2024-05-10_f1f6623d04ff2f6256728444cb6ca0eb_cryptolocker
-
Size
38KB
-
Sample
240510-yp8ndseg5s
-
MD5
f1f6623d04ff2f6256728444cb6ca0eb
-
SHA1
ca44a8297a0a902dc654960c883bf770e00feec4
-
SHA256
1e4fed086d81a0b101c3609d251a562f4838d957516d5cb126258755d4258ea1
-
SHA512
fd3628c9db4cd0cef6e89bde65bfb66f3877b3694b183c3597848d24c1eeac31f25552acc5f26d1f070b04ed5a849a6178d9a31c94c1187b0453e372c7bcc17b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBK:qDdFJy3QMOtEvwDpjjWMl7Td4
Behavioral task
behavioral1
Sample
2024-05-10_f1f6623d04ff2f6256728444cb6ca0eb_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_f1f6623d04ff2f6256728444cb6ca0eb_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-10_f1f6623d04ff2f6256728444cb6ca0eb_cryptolocker
-
Size
38KB
-
MD5
f1f6623d04ff2f6256728444cb6ca0eb
-
SHA1
ca44a8297a0a902dc654960c883bf770e00feec4
-
SHA256
1e4fed086d81a0b101c3609d251a562f4838d957516d5cb126258755d4258ea1
-
SHA512
fd3628c9db4cd0cef6e89bde65bfb66f3877b3694b183c3597848d24c1eeac31f25552acc5f26d1f070b04ed5a849a6178d9a31c94c1187b0453e372c7bcc17b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBK:qDdFJy3QMOtEvwDpjjWMl7Td4
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-