General
-
Target
2024-05-12_82a8d220359449e6fcc9737377792180_cryptolocker
-
Size
92KB
-
Sample
240512-f79pasah4t
-
MD5
82a8d220359449e6fcc9737377792180
-
SHA1
3c46f2f5d60a233c5118f7494202110b0bf8c1ef
-
SHA256
71d40ae7ab92bd3d2aaca7fd66e97a0703ebe853ab7c7d0ad1a4969a3322bcd7
-
SHA512
d3e0f22cf2d0cecd958e843d0acce0d079459252ee4832512b7ed50b67fc890c6c9391ffecdbfd3e116085a85aa68fd6475778f7732eea12587bee2943446077
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWa:zCsanOtEvwDpjK
Behavioral task
behavioral1
Sample
2024-05-12_82a8d220359449e6fcc9737377792180_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-12_82a8d220359449e6fcc9737377792180_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-12_82a8d220359449e6fcc9737377792180_cryptolocker
-
Size
92KB
-
MD5
82a8d220359449e6fcc9737377792180
-
SHA1
3c46f2f5d60a233c5118f7494202110b0bf8c1ef
-
SHA256
71d40ae7ab92bd3d2aaca7fd66e97a0703ebe853ab7c7d0ad1a4969a3322bcd7
-
SHA512
d3e0f22cf2d0cecd958e843d0acce0d079459252ee4832512b7ed50b67fc890c6c9391ffecdbfd3e116085a85aa68fd6475778f7732eea12587bee2943446077
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWa:zCsanOtEvwDpjK
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-