General
-
Target
2024-05-14_c880fb6c1a73a1e300b20b99a440aa69_cryptolocker
-
Size
39KB
-
Sample
240514-1jlyjshf8s
-
MD5
c880fb6c1a73a1e300b20b99a440aa69
-
SHA1
1b15969b5d65b856bce030b564c8fa705db582c6
-
SHA256
3c716b819ac67c6ef3d4719f1f9e2a5e7d5339de6e54bb5b5870feec3310ae13
-
SHA512
b90a89964c524ac7edf2637c19664386e7312c20c36512334d97c373140199471d10ec7ea3b8b7cbd7e0a41df505ac62cf6f04e115a540ba31a6b00c9e6c7da5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB9:qDdFJy3QMOtEvwDpjjWMl7TdL
Behavioral task
behavioral1
Sample
2024-05-14_c880fb6c1a73a1e300b20b99a440aa69_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-14_c880fb6c1a73a1e300b20b99a440aa69_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-14_c880fb6c1a73a1e300b20b99a440aa69_cryptolocker
-
Size
39KB
-
MD5
c880fb6c1a73a1e300b20b99a440aa69
-
SHA1
1b15969b5d65b856bce030b564c8fa705db582c6
-
SHA256
3c716b819ac67c6ef3d4719f1f9e2a5e7d5339de6e54bb5b5870feec3310ae13
-
SHA512
b90a89964c524ac7edf2637c19664386e7312c20c36512334d97c373140199471d10ec7ea3b8b7cbd7e0a41df505ac62cf6f04e115a540ba31a6b00c9e6c7da5
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB9:qDdFJy3QMOtEvwDpjjWMl7TdL
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-