General
-
Target
2024-05-13_aa3c71cedc330ff6eaaf9f288bf9cbff_cryptolocker
-
Size
69KB
-
Sample
240513-zbtgzscf9z
-
MD5
aa3c71cedc330ff6eaaf9f288bf9cbff
-
SHA1
b9ef63054676f647001fa6a1ea18cf74ea3ac3eb
-
SHA256
d91ae286545558c6f5c353a45ea63ae608cd21d59ebb24f3eb094930dd5ad493
-
SHA512
6b03ef7e80893e549270c7f5be3b15d2bd7353cd3cff4d340ed80734e5d490aab29c7617654487bc5d329b5c663fdb6392f401c3a2ee9346916437cfe538617d
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1PI:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAI
Behavioral task
behavioral1
Sample
2024-05-13_aa3c71cedc330ff6eaaf9f288bf9cbff_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-13_aa3c71cedc330ff6eaaf9f288bf9cbff_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-13_aa3c71cedc330ff6eaaf9f288bf9cbff_cryptolocker
-
Size
69KB
-
MD5
aa3c71cedc330ff6eaaf9f288bf9cbff
-
SHA1
b9ef63054676f647001fa6a1ea18cf74ea3ac3eb
-
SHA256
d91ae286545558c6f5c353a45ea63ae608cd21d59ebb24f3eb094930dd5ad493
-
SHA512
6b03ef7e80893e549270c7f5be3b15d2bd7353cd3cff4d340ed80734e5d490aab29c7617654487bc5d329b5c663fdb6392f401c3a2ee9346916437cfe538617d
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1PI:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAI
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-