General
-
Target
2024-05-21_8ce984931e7724f99f2493f541586f28_cryptolocker
-
Size
89KB
-
Sample
240521-s7rvpsah9s
-
MD5
8ce984931e7724f99f2493f541586f28
-
SHA1
34984bbe535c18a06b9f837134089751ef165eab
-
SHA256
9406361feac84c30660cebab20a043f14f35d8850fb147c3661f05d768f47f86
-
SHA512
9766a9a0af058a0d8db2ea564312a6662584b6a5a7d31351ca04ea1550ad6927264a223301165e4bce74e145e0a9086d71aacb0d72bc2177be092e91bd1e2933
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIiW:AnBdOOtEvwDpj6zk
Behavioral task
behavioral1
Sample
2024-05-21_8ce984931e7724f99f2493f541586f28_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-21_8ce984931e7724f99f2493f541586f28_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_8ce984931e7724f99f2493f541586f28_cryptolocker
-
Size
89KB
-
MD5
8ce984931e7724f99f2493f541586f28
-
SHA1
34984bbe535c18a06b9f837134089751ef165eab
-
SHA256
9406361feac84c30660cebab20a043f14f35d8850fb147c3661f05d768f47f86
-
SHA512
9766a9a0af058a0d8db2ea564312a6662584b6a5a7d31351ca04ea1550ad6927264a223301165e4bce74e145e0a9086d71aacb0d72bc2177be092e91bd1e2933
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIiW:AnBdOOtEvwDpj6zk
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-