General
-
Target
2024-05-21_156bd7d4431fbff2db5f3d38e41c2dd0_cryptolocker
-
Size
59KB
-
Sample
240521-e4k14ahc22
-
MD5
156bd7d4431fbff2db5f3d38e41c2dd0
-
SHA1
619552c7c78eb7f9e1ef9e4a6dfee09a2f633612
-
SHA256
786701f9aad800c877c9eab9d41eccfe9a431fb459c8ecc7a285f64ebe17b381
-
SHA512
a6a0a1402d2e350687457d439a391d536aeebcde6546ce14c49018f7c8de6528b3675d036a5795d8b001004ddff8d7fd0dc7c94b1588f4c2a1147dd2a2f9dbf5
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPji:H6QFElP6n+gou9cvMOtEvwDpjCpVXz
Behavioral task
behavioral1
Sample
2024-05-21_156bd7d4431fbff2db5f3d38e41c2dd0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_156bd7d4431fbff2db5f3d38e41c2dd0_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-21_156bd7d4431fbff2db5f3d38e41c2dd0_cryptolocker
-
Size
59KB
-
MD5
156bd7d4431fbff2db5f3d38e41c2dd0
-
SHA1
619552c7c78eb7f9e1ef9e4a6dfee09a2f633612
-
SHA256
786701f9aad800c877c9eab9d41eccfe9a431fb459c8ecc7a285f64ebe17b381
-
SHA512
a6a0a1402d2e350687457d439a391d536aeebcde6546ce14c49018f7c8de6528b3675d036a5795d8b001004ddff8d7fd0dc7c94b1588f4c2a1147dd2a2f9dbf5
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPji:H6QFElP6n+gou9cvMOtEvwDpjCpVXz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-