General
-
Target
2024-05-11_39a4ba3598f0db72db0f7e6f2eca5908_cryptolocker
-
Size
88KB
-
Sample
240511-r5wv7sfb33
-
MD5
39a4ba3598f0db72db0f7e6f2eca5908
-
SHA1
c32780d5a05bcec883b20d4e1bb097250f3b933d
-
SHA256
de6f2ed28b4de0bc5c6c6f72e20d64e678c275e7d4782bd06ccf6f38c87284ef
-
SHA512
a75a35a30bbf1421b80cb74086af0ed66496988752dbd98287a09214eaee0fb25be9c0e0168ebc6fb5763f6a829aa810c986ef386c218bcb374d5ca1835b36c5
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODa:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgw
Behavioral task
behavioral1
Sample
2024-05-11_39a4ba3598f0db72db0f7e6f2eca5908_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-11_39a4ba3598f0db72db0f7e6f2eca5908_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-11_39a4ba3598f0db72db0f7e6f2eca5908_cryptolocker
-
Size
88KB
-
MD5
39a4ba3598f0db72db0f7e6f2eca5908
-
SHA1
c32780d5a05bcec883b20d4e1bb097250f3b933d
-
SHA256
de6f2ed28b4de0bc5c6c6f72e20d64e678c275e7d4782bd06ccf6f38c87284ef
-
SHA512
a75a35a30bbf1421b80cb74086af0ed66496988752dbd98287a09214eaee0fb25be9c0e0168ebc6fb5763f6a829aa810c986ef386c218bcb374d5ca1835b36c5
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODa:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgw
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-