General
-
Target
2024-05-17_a2289e4ce8ad929e0f1a787f8423f1cb_cryptolocker
-
Size
72KB
-
Sample
240517-e6te9ahf64
-
MD5
a2289e4ce8ad929e0f1a787f8423f1cb
-
SHA1
242dc935070a3ab056ecfe270c1605ba8bfd88b5
-
SHA256
9b8a3ac194df8c7ca2cf3b3972ee0c7a17347b68812504407a92d5ab38f8d88e
-
SHA512
65ab95919331bf2781406fcd1c70cec9250318cee78b894eb0ba9306bf7e09e8150d3c559741f58bc1ad462bfc38d2fe710427596191fba61bf101868660597d
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95F:C4Q2c94OtEvwDpj4H8zW
Behavioral task
behavioral1
Sample
2024-05-17_a2289e4ce8ad929e0f1a787f8423f1cb_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_a2289e4ce8ad929e0f1a787f8423f1cb_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-17_a2289e4ce8ad929e0f1a787f8423f1cb_cryptolocker
-
Size
72KB
-
MD5
a2289e4ce8ad929e0f1a787f8423f1cb
-
SHA1
242dc935070a3ab056ecfe270c1605ba8bfd88b5
-
SHA256
9b8a3ac194df8c7ca2cf3b3972ee0c7a17347b68812504407a92d5ab38f8d88e
-
SHA512
65ab95919331bf2781406fcd1c70cec9250318cee78b894eb0ba9306bf7e09e8150d3c559741f58bc1ad462bfc38d2fe710427596191fba61bf101868660597d
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95F:C4Q2c94OtEvwDpj4H8zW
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-