General
-
Target
2024-05-21_ea760eedc4289723358cd5284401e3b3_cryptolocker
-
Size
24KB
-
Sample
240521-krz75sfc35
-
MD5
ea760eedc4289723358cd5284401e3b3
-
SHA1
6af078950309c60a55059b7bfbd21750859efc14
-
SHA256
236b4894ba66792c7047feeb3789be5fd8c453445e7135c01065949082482772
-
SHA512
2cc19a379bd210c83be05b0910d9432f0e5d3f426be974a59e59bfedaf0f1f78b0a979b6648883b7d7372109cd63a6ee9982f9b28335d3145a6bfd2aa22ecde0
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJ2n:bVCPwFRo6CpwXFXSqQXfjAsJk
Behavioral task
behavioral1
Sample
2024-05-21_ea760eedc4289723358cd5284401e3b3_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_ea760eedc4289723358cd5284401e3b3_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_ea760eedc4289723358cd5284401e3b3_cryptolocker
-
Size
24KB
-
MD5
ea760eedc4289723358cd5284401e3b3
-
SHA1
6af078950309c60a55059b7bfbd21750859efc14
-
SHA256
236b4894ba66792c7047feeb3789be5fd8c453445e7135c01065949082482772
-
SHA512
2cc19a379bd210c83be05b0910d9432f0e5d3f426be974a59e59bfedaf0f1f78b0a979b6648883b7d7372109cd63a6ee9982f9b28335d3145a6bfd2aa22ecde0
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJ2n:bVCPwFRo6CpwXFXSqQXfjAsJk
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-