General
-
Target
2024-05-21_fafcc7ae9f0de3846466d2d551250990_cryptolocker
-
Size
93KB
-
Sample
240521-ks4lysfd7x
-
MD5
fafcc7ae9f0de3846466d2d551250990
-
SHA1
30c2842f2dd535496fef22713951ed540788ebec
-
SHA256
e8f58d2f5f4ae5ad15b13220c0580b730b81cbe4d5dad24234aaa12560fa1808
-
SHA512
5b36c5b1f2925082992fd9d7f48a01c43ea6bb027e8bb4885660b08d31babd71fd2e7c6f3d06a5c90af27d199c149c50130aee462b81d4861baed875668953a9
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWpR1A:zCsanOtEvwDpj/2
Behavioral task
behavioral1
Sample
2024-05-21_fafcc7ae9f0de3846466d2d551250990_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-21_fafcc7ae9f0de3846466d2d551250990_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-21_fafcc7ae9f0de3846466d2d551250990_cryptolocker
-
Size
93KB
-
MD5
fafcc7ae9f0de3846466d2d551250990
-
SHA1
30c2842f2dd535496fef22713951ed540788ebec
-
SHA256
e8f58d2f5f4ae5ad15b13220c0580b730b81cbe4d5dad24234aaa12560fa1808
-
SHA512
5b36c5b1f2925082992fd9d7f48a01c43ea6bb027e8bb4885660b08d31babd71fd2e7c6f3d06a5c90af27d199c149c50130aee462b81d4861baed875668953a9
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjhWpR1A:zCsanOtEvwDpj/2
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-