General
-
Target
2024-05-21_6bfebcfbc6db59fc9f3e40b2d5716156_cryptolocker
-
Size
73KB
-
Sample
240521-s4t6naag8v
-
MD5
6bfebcfbc6db59fc9f3e40b2d5716156
-
SHA1
f6267ae49ede661f383ef2b9eb5301715f2df754
-
SHA256
05fb3f761ae0530c5ca4677f467954e21fa62a743409d0559f8f36978faf5584
-
SHA512
0557a3fb6364ed0aa7cfa04a51113f883146ce3344a6903141a7250211e8815da9e7dff1704b474743de468a648599aa7c6e70c46dd58126f8b3ba673c650e9e
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Vy:C4Q2c94OtEvwDpj4H8z9
Behavioral task
behavioral1
Sample
2024-05-21_6bfebcfbc6db59fc9f3e40b2d5716156_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_6bfebcfbc6db59fc9f3e40b2d5716156_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_6bfebcfbc6db59fc9f3e40b2d5716156_cryptolocker
-
Size
73KB
-
MD5
6bfebcfbc6db59fc9f3e40b2d5716156
-
SHA1
f6267ae49ede661f383ef2b9eb5301715f2df754
-
SHA256
05fb3f761ae0530c5ca4677f467954e21fa62a743409d0559f8f36978faf5584
-
SHA512
0557a3fb6364ed0aa7cfa04a51113f883146ce3344a6903141a7250211e8815da9e7dff1704b474743de468a648599aa7c6e70c46dd58126f8b3ba673c650e9e
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Vy:C4Q2c94OtEvwDpj4H8z9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-