General
-
Target
2024-05-16_db3a07f09063ee71cb22cf12456bbe56_cryptolocker
-
Size
39KB
-
Sample
240516-ypwzladh2v
-
MD5
db3a07f09063ee71cb22cf12456bbe56
-
SHA1
8746479d51c10a83b0b5fb62d5dfc998c0cdde7a
-
SHA256
1d7e75791e0e75681f7ba0557644b9a9ad25e78d5c5d8eeeac54eaa09460b282
-
SHA512
9b579ec920c647d909db4a57ae10463142c7f5fa36dd6e0d129200c3515826d54c54463df672e746c135abc0160fba224fc293edb7ebc9c192000d56f5038faa
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYC:qDdFJy3QMOtEvwDpjjWMl7Tb
Behavioral task
behavioral1
Sample
2024-05-16_db3a07f09063ee71cb22cf12456bbe56_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_db3a07f09063ee71cb22cf12456bbe56_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-16_db3a07f09063ee71cb22cf12456bbe56_cryptolocker
-
Size
39KB
-
MD5
db3a07f09063ee71cb22cf12456bbe56
-
SHA1
8746479d51c10a83b0b5fb62d5dfc998c0cdde7a
-
SHA256
1d7e75791e0e75681f7ba0557644b9a9ad25e78d5c5d8eeeac54eaa09460b282
-
SHA512
9b579ec920c647d909db4a57ae10463142c7f5fa36dd6e0d129200c3515826d54c54463df672e746c135abc0160fba224fc293edb7ebc9c192000d56f5038faa
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYC:qDdFJy3QMOtEvwDpjjWMl7Tb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-