General
-
Target
2024-05-15_2ce3d08ad552afec91ceda7a0db7d745_cryptolocker
-
Size
39KB
-
Sample
240515-q39hvacc2t
-
MD5
2ce3d08ad552afec91ceda7a0db7d745
-
SHA1
1a01795e3dfe3c83e4757e8910003f6172bf9c4d
-
SHA256
021dd95f882d4b8b5b862ef0fdd50a7b066c792be86146e798445efd2c834d6f
-
SHA512
d8b540ff5c86a33b6a71f9ab18c64aa7e1ec18929c803ba8ba8c3cf31c799bcd8455943fc366930b4cf4913f1af5146981e933b08bff2d55985773b4b110fed7
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB8H:qDdFJy3QMOtEvwDpjjWMl7TdGH
Behavioral task
behavioral1
Sample
2024-05-15_2ce3d08ad552afec91ceda7a0db7d745_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_2ce3d08ad552afec91ceda7a0db7d745_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-15_2ce3d08ad552afec91ceda7a0db7d745_cryptolocker
-
Size
39KB
-
MD5
2ce3d08ad552afec91ceda7a0db7d745
-
SHA1
1a01795e3dfe3c83e4757e8910003f6172bf9c4d
-
SHA256
021dd95f882d4b8b5b862ef0fdd50a7b066c792be86146e798445efd2c834d6f
-
SHA512
d8b540ff5c86a33b6a71f9ab18c64aa7e1ec18929c803ba8ba8c3cf31c799bcd8455943fc366930b4cf4913f1af5146981e933b08bff2d55985773b4b110fed7
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB8H:qDdFJy3QMOtEvwDpjjWMl7TdGH
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-