General
-
Target
2024-05-22_b74b50566216c4b027b6730633c26615_cryptolocker
-
Size
64KB
-
Sample
240522-1rzvdaab8x
-
MD5
b74b50566216c4b027b6730633c26615
-
SHA1
48025bab3abd3884c664ae21c1b98c11f9eff1e7
-
SHA256
d5cb9a3212768113db20f53409e9bf3b084a399e32f71c2af5e3a0a14f2116d8
-
SHA512
d7560e59fab7605ee4e93d1bf57829b0ca7eb9cedf6e3a5c3b84fc7ee4946b0d289b34ee8e7e042767865e587d6ca189b35ae9842de4fd4cbde70a60e77be9ac
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiW:BbdDmjr+OtEvwDpjM8D
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_b74b50566216c4b027b6730633c26615_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_b74b50566216c4b027b6730633c26615_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_b74b50566216c4b027b6730633c26615_cryptolocker
-
Size
64KB
-
MD5
b74b50566216c4b027b6730633c26615
-
SHA1
48025bab3abd3884c664ae21c1b98c11f9eff1e7
-
SHA256
d5cb9a3212768113db20f53409e9bf3b084a399e32f71c2af5e3a0a14f2116d8
-
SHA512
d7560e59fab7605ee4e93d1bf57829b0ca7eb9cedf6e3a5c3b84fc7ee4946b0d289b34ee8e7e042767865e587d6ca189b35ae9842de4fd4cbde70a60e77be9ac
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiW:BbdDmjr+OtEvwDpjM8D
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-