General
-
Target
2024-05-21_66a0777bd8f46ab75b6a9d335335db7c_cryptolocker
-
Size
39KB
-
Sample
240521-s4d5faag6s
-
MD5
66a0777bd8f46ab75b6a9d335335db7c
-
SHA1
0118df92c53a8e8b434c5bff57b869a912bc21f7
-
SHA256
85e22e67189a257f8ecef2beecf11bf126f94a132e9156033bf31e7b4ff9b835
-
SHA512
a2a6b06cfecdd70c4bc04bcc9dd551b55dc5da00ced39219922cc5ff53cf7e250540e91477096800436e2c28f04868541cd2a13e4a3143e2e04d5c156f0a6436
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsWr:qDdFJy3QMOtEvwDpjjWMl7TdTr
Behavioral task
behavioral1
Sample
2024-05-21_66a0777bd8f46ab75b6a9d335335db7c_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-21_66a0777bd8f46ab75b6a9d335335db7c_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_66a0777bd8f46ab75b6a9d335335db7c_cryptolocker
-
Size
39KB
-
MD5
66a0777bd8f46ab75b6a9d335335db7c
-
SHA1
0118df92c53a8e8b434c5bff57b869a912bc21f7
-
SHA256
85e22e67189a257f8ecef2beecf11bf126f94a132e9156033bf31e7b4ff9b835
-
SHA512
a2a6b06cfecdd70c4bc04bcc9dd551b55dc5da00ced39219922cc5ff53cf7e250540e91477096800436e2c28f04868541cd2a13e4a3143e2e04d5c156f0a6436
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsWr:qDdFJy3QMOtEvwDpjjWMl7TdTr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-