General
-
Target
2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker
-
Size
97KB
-
Sample
240515-d76xasfe4x
-
MD5
c55606fd7e7405deb0f826768d539e93
-
SHA1
a4287cc4eb602d7c5425b487758cbeffa94074cf
-
SHA256
779e0ec7d4047e0e14662e9a33d27ca0761a6cf7ad3ad806b9db3753745f3178
-
SHA512
35484c7e687c8a8336843d453e2d46ec361903181b42cfc68edcac951e271e4547d33a709ffbc42c7833025c7295abc0252ee7671c4df23483902fdeadff1c6b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqn:zCsanOtEvwDpjB2
Behavioral task
behavioral1
Sample
2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-15_c55606fd7e7405deb0f826768d539e93_cryptolocker
-
Size
97KB
-
MD5
c55606fd7e7405deb0f826768d539e93
-
SHA1
a4287cc4eb602d7c5425b487758cbeffa94074cf
-
SHA256
779e0ec7d4047e0e14662e9a33d27ca0761a6cf7ad3ad806b9db3753745f3178
-
SHA512
35484c7e687c8a8336843d453e2d46ec361903181b42cfc68edcac951e271e4547d33a709ffbc42c7833025c7295abc0252ee7671c4df23483902fdeadff1c6b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqn:zCsanOtEvwDpjB2
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-