General
-
Target
2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker
-
Size
77KB
-
Sample
240520-a2cvgsbg6v
-
MD5
81ff8ff918692b52da59976913222343
-
SHA1
bc4e1d9d705c1d5b592d1d8e5862ebc3a50cf623
-
SHA256
2295ad673c7e18c663fbce41a7b1a592a19db4a88936bf4ce9894382ec592188
-
SHA512
bbf10a26e0c9bea065217d16ed78d40ce8d756f976301008c726e97da3c9ee17c82d345b1bb98ec142ed499403c73a3909e095989890212a713a98404ecb06ef
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxD:T6a+rdOOtEvwDpjNtHP8
Behavioral task
behavioral1
Sample
2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker
-
Size
77KB
-
MD5
81ff8ff918692b52da59976913222343
-
SHA1
bc4e1d9d705c1d5b592d1d8e5862ebc3a50cf623
-
SHA256
2295ad673c7e18c663fbce41a7b1a592a19db4a88936bf4ce9894382ec592188
-
SHA512
bbf10a26e0c9bea065217d16ed78d40ce8d756f976301008c726e97da3c9ee17c82d345b1bb98ec142ed499403c73a3909e095989890212a713a98404ecb06ef
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxD:T6a+rdOOtEvwDpjNtHP8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-