General
-
Target
2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker
-
Size
39KB
-
Sample
240522-1qg8yaac67
-
MD5
94c362d801691e3973aeb8e7ad025d15
-
SHA1
dbc15913b48cc2e059c914d7325a3f6de5a56825
-
SHA256
f066eb36d005e4511cf18ddf4a0a7a4d952a58f7e7a196d499827c5fd10b1051
-
SHA512
fed2a7376aa23a4a817ed9c5708a42b392766393bf905db93396e1919ab614f59ac394b4f5ed26a3245fa327924fe6e3c8aa070352833920605302d998b47dee
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsw:qDdFJy3QMOtEvwDpjjWMl7TdX
Behavioral task
behavioral1
Sample
2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker
-
Size
39KB
-
MD5
94c362d801691e3973aeb8e7ad025d15
-
SHA1
dbc15913b48cc2e059c914d7325a3f6de5a56825
-
SHA256
f066eb36d005e4511cf18ddf4a0a7a4d952a58f7e7a196d499827c5fd10b1051
-
SHA512
fed2a7376aa23a4a817ed9c5708a42b392766393bf905db93396e1919ab614f59ac394b4f5ed26a3245fa327924fe6e3c8aa070352833920605302d998b47dee
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsw:qDdFJy3QMOtEvwDpjjWMl7TdX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-