General
-
Target
2024-05-20_5e4fd549665a84b15d13b7b73d9d71f7_cryptolocker
-
Size
39KB
-
Sample
240520-3fagfsbe7v
-
MD5
5e4fd549665a84b15d13b7b73d9d71f7
-
SHA1
e5ed2f3522ca7f1ae93c57bb17b7fffdf7914d19
-
SHA256
978e22d95fc6e134e731ee968e26aef5d629839ef9c646d09019225ec1b19c74
-
SHA512
a1ec0c3b83ab49c5efe529be364b67e8f1a0181266b34f756fd46ee87b1a108606351472fa44e367f6b20cda8c312a24b324f8e7b1e671f3ffd23c71b6872b51
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB81:qDdFJy3QMOtEvwDpjjWMl7TdG1
Behavioral task
behavioral1
Sample
2024-05-20_5e4fd549665a84b15d13b7b73d9d71f7_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-20_5e4fd549665a84b15d13b7b73d9d71f7_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-20_5e4fd549665a84b15d13b7b73d9d71f7_cryptolocker
-
Size
39KB
-
MD5
5e4fd549665a84b15d13b7b73d9d71f7
-
SHA1
e5ed2f3522ca7f1ae93c57bb17b7fffdf7914d19
-
SHA256
978e22d95fc6e134e731ee968e26aef5d629839ef9c646d09019225ec1b19c74
-
SHA512
a1ec0c3b83ab49c5efe529be364b67e8f1a0181266b34f756fd46ee87b1a108606351472fa44e367f6b20cda8c312a24b324f8e7b1e671f3ffd23c71b6872b51
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB81:qDdFJy3QMOtEvwDpjjWMl7TdG1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-