General
-
Target
2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker
-
Size
77KB
-
Sample
240514-r95znsbh66
-
MD5
aa42ba33024932b33e64efa133afee8d
-
SHA1
d4581a279a0a21cf1b215f6d7fc0efd6a7158640
-
SHA256
32128bcb1996ee332b58bb6b0a99d34fe1f1c5d30423d1fe75896cdc54c2f0c4
-
SHA512
8b7a50cbade9436c24dffea8917393bfc4e5ee52a6f16e6529802de206798f123b49d54e5fa3159ad0cfe6ba978d60b5a1fe3e4e7f01f807a59e659f693bcebf
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx2:T6a+rdOOtEvwDpjNtHPF
Behavioral task
behavioral1
Sample
2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-14_aa42ba33024932b33e64efa133afee8d_cryptolocker
-
Size
77KB
-
MD5
aa42ba33024932b33e64efa133afee8d
-
SHA1
d4581a279a0a21cf1b215f6d7fc0efd6a7158640
-
SHA256
32128bcb1996ee332b58bb6b0a99d34fe1f1c5d30423d1fe75896cdc54c2f0c4
-
SHA512
8b7a50cbade9436c24dffea8917393bfc4e5ee52a6f16e6529802de206798f123b49d54e5fa3159ad0cfe6ba978d60b5a1fe3e4e7f01f807a59e659f693bcebf
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx2:T6a+rdOOtEvwDpjNtHPF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-