General
-
Target
2024-05-20_ac4ff2f71e606de7247f4ade3503244f_cryptolocker
-
Size
46KB
-
Sample
240520-sjmwvaff5y
-
MD5
ac4ff2f71e606de7247f4ade3503244f
-
SHA1
40063d8f41c638255596cfe68257554c218f424d
-
SHA256
f503ee8316a73b68665fd3b6ea59f5c18d54d3bcfba8f5ec3f5168605893a192
-
SHA512
6b933eb1183483034ce773fcf3fb3da819a427dc545940500e7a03734d5735e9ce2312de29bb5e2ab232c2b68964c8cc40ff012647a81c6bd9cab9368cc55bfd
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL8:qmbhXDmjr5MOtEvwDpj5cDtKkQZQy
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_ac4ff2f71e606de7247f4ade3503244f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-20_ac4ff2f71e606de7247f4ade3503244f_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-20_ac4ff2f71e606de7247f4ade3503244f_cryptolocker
-
Size
46KB
-
MD5
ac4ff2f71e606de7247f4ade3503244f
-
SHA1
40063d8f41c638255596cfe68257554c218f424d
-
SHA256
f503ee8316a73b68665fd3b6ea59f5c18d54d3bcfba8f5ec3f5168605893a192
-
SHA512
6b933eb1183483034ce773fcf3fb3da819a427dc545940500e7a03734d5735e9ce2312de29bb5e2ab232c2b68964c8cc40ff012647a81c6bd9cab9368cc55bfd
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL8:qmbhXDmjr5MOtEvwDpj5cDtKkQZQy
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-