General
-
Target
2024-05-15_7d78a0b9073d2368cdfdebe73577c980_cryptolocker
-
Size
70KB
-
Sample
240515-psbndshf2z
-
MD5
7d78a0b9073d2368cdfdebe73577c980
-
SHA1
c2fe35d463be4a453dd5ad6987df4f77d4fe3895
-
SHA256
cd3dd26d5db83692ef8f64920875b0cea14489a44542b2f48f683f16badac052
-
SHA512
c624ef354e0adc2550357e90c4b10086a20201378a5d398718fb1eb8a11755ed4952df9aa98c42fa614439f686b9e36eda51df8dd010a3a59d538d8e21a81dfc
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Y:C4Q2c94OtEvwDpj4H8zp
Behavioral task
behavioral1
Sample
2024-05-15_7d78a0b9073d2368cdfdebe73577c980_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-15_7d78a0b9073d2368cdfdebe73577c980_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-15_7d78a0b9073d2368cdfdebe73577c980_cryptolocker
-
Size
70KB
-
MD5
7d78a0b9073d2368cdfdebe73577c980
-
SHA1
c2fe35d463be4a453dd5ad6987df4f77d4fe3895
-
SHA256
cd3dd26d5db83692ef8f64920875b0cea14489a44542b2f48f683f16badac052
-
SHA512
c624ef354e0adc2550357e90c4b10086a20201378a5d398718fb1eb8a11755ed4952df9aa98c42fa614439f686b9e36eda51df8dd010a3a59d538d8e21a81dfc
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Y:C4Q2c94OtEvwDpj4H8zp
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-