General
-
Target
2024-05-21_4241a789e1524d2ad2bcfec7daad7e1b_cryptolocker
-
Size
59KB
-
Sample
240521-fdextsaa6v
-
MD5
4241a789e1524d2ad2bcfec7daad7e1b
-
SHA1
bacb702114ef263886958d40cd98e31fef5648c5
-
SHA256
d83ebd78ae09facb06e53549ef923bdeaa671d5ed7b32d7f5677e3b5847c5241
-
SHA512
18a9a23ce1c2f3b92cabbd90e5d4889c6de13284a5c6407aac789dc18ac4d63b05abab416278a5fdd9764af0785269f8051e418abd70e856652e3515e60dbb04
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjZ:H6QFElP6n+gou9cvMOtEvwDpjCpVX0
Behavioral task
behavioral1
Sample
2024-05-21_4241a789e1524d2ad2bcfec7daad7e1b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_4241a789e1524d2ad2bcfec7daad7e1b_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_4241a789e1524d2ad2bcfec7daad7e1b_cryptolocker
-
Size
59KB
-
MD5
4241a789e1524d2ad2bcfec7daad7e1b
-
SHA1
bacb702114ef263886958d40cd98e31fef5648c5
-
SHA256
d83ebd78ae09facb06e53549ef923bdeaa671d5ed7b32d7f5677e3b5847c5241
-
SHA512
18a9a23ce1c2f3b92cabbd90e5d4889c6de13284a5c6407aac789dc18ac4d63b05abab416278a5fdd9764af0785269f8051e418abd70e856652e3515e60dbb04
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjZ:H6QFElP6n+gou9cvMOtEvwDpjCpVX0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-