General
-
Target
2024-05-11_6a620998efd76d9d0e476cb2088dd668_cryptolocker
-
Size
80KB
-
Sample
240511-bsqwesga25
-
MD5
6a620998efd76d9d0e476cb2088dd668
-
SHA1
e82f46b6db968e9be96d3c08d28c04e0f1958e31
-
SHA256
f5f656101d4ca48ea2b080b7926332932215e7fe0f02ddca3358441d6f0cbf11
-
SHA512
5b0f5c86d6ebd067d7214e75866584166e27521bd007fe70cfda9e2f6ee9d1880bddf5748f0e27c809fbb99601698b4d4a7ef5e03d61f3c5279dbbf7f593ffd4
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QI:zCsanOtEvwDpj8
Behavioral task
behavioral1
Sample
2024-05-11_6a620998efd76d9d0e476cb2088dd668_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-11_6a620998efd76d9d0e476cb2088dd668_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-11_6a620998efd76d9d0e476cb2088dd668_cryptolocker
-
Size
80KB
-
MD5
6a620998efd76d9d0e476cb2088dd668
-
SHA1
e82f46b6db968e9be96d3c08d28c04e0f1958e31
-
SHA256
f5f656101d4ca48ea2b080b7926332932215e7fe0f02ddca3358441d6f0cbf11
-
SHA512
5b0f5c86d6ebd067d7214e75866584166e27521bd007fe70cfda9e2f6ee9d1880bddf5748f0e27c809fbb99601698b4d4a7ef5e03d61f3c5279dbbf7f593ffd4
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QI:zCsanOtEvwDpj8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-