General
-
Target
2024-05-13_a7eebcc994619d56300daec95c852789_cryptolocker
-
Size
51KB
-
Sample
240513-vb39zafe27
-
MD5
a7eebcc994619d56300daec95c852789
-
SHA1
ded222706e0c311411a6af11583fcd88d9865c1e
-
SHA256
fe1872bd0b45ff55fcd2b3c5ef824a0342edf9f93fb4e6cdc3e00c66296755c5
-
SHA512
0efe34cc15815eedfa85e06b7d65e5efb7e904e7bb3414df2fbbafcfba034785bd3546951eedeac46ad4ea6438f4dc01047e75ccbe43e7fe011476b8988312b0
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moccx:qmbhXDmjr5MOtEvwDpj5cDtKkQZQzb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-13_a7eebcc994619d56300daec95c852789_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-13_a7eebcc994619d56300daec95c852789_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-13_a7eebcc994619d56300daec95c852789_cryptolocker
-
Size
51KB
-
MD5
a7eebcc994619d56300daec95c852789
-
SHA1
ded222706e0c311411a6af11583fcd88d9865c1e
-
SHA256
fe1872bd0b45ff55fcd2b3c5ef824a0342edf9f93fb4e6cdc3e00c66296755c5
-
SHA512
0efe34cc15815eedfa85e06b7d65e5efb7e904e7bb3414df2fbbafcfba034785bd3546951eedeac46ad4ea6438f4dc01047e75ccbe43e7fe011476b8988312b0
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moccx:qmbhXDmjr5MOtEvwDpj5cDtKkQZQzb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-