General
-
Target
2024-05-15_f76c30e568e0c405a558f127ed150fd8_cryptolocker
-
Size
96KB
-
Sample
240515-kdc6fshb72
-
MD5
f76c30e568e0c405a558f127ed150fd8
-
SHA1
000c299038275bae862bd5abead8c423b5437ee7
-
SHA256
83e41bfc89562cdcb5e0f8538072f4cf6910d92bf6d1b3b38135f20d6cd4927f
-
SHA512
5689a05bd533e2664da5b30177aaa988cd03d3d46ecc2c8c983362c95aa0b489e278e77d97d84df58b6aacad21af84fa8928783bfe49521bd1c5d46318eb8cb0
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01E:AnBdOOtEvwDpj6zC
Behavioral task
behavioral1
Sample
2024-05-15_f76c30e568e0c405a558f127ed150fd8_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-15_f76c30e568e0c405a558f127ed150fd8_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-15_f76c30e568e0c405a558f127ed150fd8_cryptolocker
-
Size
96KB
-
MD5
f76c30e568e0c405a558f127ed150fd8
-
SHA1
000c299038275bae862bd5abead8c423b5437ee7
-
SHA256
83e41bfc89562cdcb5e0f8538072f4cf6910d92bf6d1b3b38135f20d6cd4927f
-
SHA512
5689a05bd533e2664da5b30177aaa988cd03d3d46ecc2c8c983362c95aa0b489e278e77d97d84df58b6aacad21af84fa8928783bfe49521bd1c5d46318eb8cb0
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01E:AnBdOOtEvwDpj6zC
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-