General
-
Target
2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker
-
Size
40KB
-
Sample
240522-bh7q7afg2x
-
MD5
ea4f0041cefd4976bd564a79105aab73
-
SHA1
25da0d5574e571423cbd7994607d8336d6accdf6
-
SHA256
be72a30b42bb3cb1c5f8c4512530c0f64aa5bb2826d5219e84c6137d6c6dd521
-
SHA512
90cfea2f628d150cae1bf0e8f0e330365b82cdf282061ef1bd5840281fccde2b2f44989eb1662018aa81c2d871e53a4a22a642a71dbe4923ee19c134325d11dd
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gi:qDdFJy3QMOtEvwDpjjWMl7TdCgi
Behavioral task
behavioral1
Sample
2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker
-
Size
40KB
-
MD5
ea4f0041cefd4976bd564a79105aab73
-
SHA1
25da0d5574e571423cbd7994607d8336d6accdf6
-
SHA256
be72a30b42bb3cb1c5f8c4512530c0f64aa5bb2826d5219e84c6137d6c6dd521
-
SHA512
90cfea2f628d150cae1bf0e8f0e330365b82cdf282061ef1bd5840281fccde2b2f44989eb1662018aa81c2d871e53a4a22a642a71dbe4923ee19c134325d11dd
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gi:qDdFJy3QMOtEvwDpjjWMl7TdCgi
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-