General
-
Target
2024-05-21_59ebd007603af21305471a374168cefc_cryptolocker
-
Size
91KB
-
Sample
240521-s2jl5saf25
-
MD5
59ebd007603af21305471a374168cefc
-
SHA1
8d418fbf7bb959d79b53fe625ddcb42bc71a6e5d
-
SHA256
991b023f61e97d4ba11780d0b0f214b46f8bbf3c710b66f04068990e8925df72
-
SHA512
01bf001567bb6ef405a6ed0f788381774ee42264feb9e767c068523422b1f34cc8902ece1c9b956cf6deba8c6f52c07904f6b2a0fc7fcf5ea6b347217ab43ed5
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddM:AnBdOOtEvwDpj6z4
Behavioral task
behavioral1
Sample
2024-05-21_59ebd007603af21305471a374168cefc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_59ebd007603af21305471a374168cefc_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_59ebd007603af21305471a374168cefc_cryptolocker
-
Size
91KB
-
MD5
59ebd007603af21305471a374168cefc
-
SHA1
8d418fbf7bb959d79b53fe625ddcb42bc71a6e5d
-
SHA256
991b023f61e97d4ba11780d0b0f214b46f8bbf3c710b66f04068990e8925df72
-
SHA512
01bf001567bb6ef405a6ed0f788381774ee42264feb9e767c068523422b1f34cc8902ece1c9b956cf6deba8c6f52c07904f6b2a0fc7fcf5ea6b347217ab43ed5
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddM:AnBdOOtEvwDpj6z4
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-