General
-
Target
2024-05-21_f7cbe46ad8809ee7c307f1f5dc9053f4_cryptolocker
-
Size
91KB
-
Sample
240521-tj7fxsbc57
-
MD5
f7cbe46ad8809ee7c307f1f5dc9053f4
-
SHA1
09857134388116ec419b18d5cb6f68b08bf7015c
-
SHA256
290a75769e60241dee12c3eb6dd8f0542d03f074a6a90327fe10ed1395f40301
-
SHA512
a90503a03788d5cecf9fd1e3c8dbd6a7164d42f8d3f7c7e27cb3b7a9d9dd908bba72b23f483e351782db5e7a2f008863e6962ab3bdd413bfea32959dc26f5c5b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddf:AnBdOOtEvwDpj6zb
Behavioral task
behavioral1
Sample
2024-05-21_f7cbe46ad8809ee7c307f1f5dc9053f4_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_f7cbe46ad8809ee7c307f1f5dc9053f4_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-21_f7cbe46ad8809ee7c307f1f5dc9053f4_cryptolocker
-
Size
91KB
-
MD5
f7cbe46ad8809ee7c307f1f5dc9053f4
-
SHA1
09857134388116ec419b18d5cb6f68b08bf7015c
-
SHA256
290a75769e60241dee12c3eb6dd8f0542d03f074a6a90327fe10ed1395f40301
-
SHA512
a90503a03788d5cecf9fd1e3c8dbd6a7164d42f8d3f7c7e27cb3b7a9d9dd908bba72b23f483e351782db5e7a2f008863e6962ab3bdd413bfea32959dc26f5c5b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddf:AnBdOOtEvwDpj6zb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-