General
-
Target
2024-05-22_b6ff6c2df4e769c6c4ecd21bacf558e1_cryptolocker
-
Size
80KB
-
Sample
240522-c9fx8ahh33
-
MD5
b6ff6c2df4e769c6c4ecd21bacf558e1
-
SHA1
8aeef753a80fbcb7be72593695754eff15af5a0b
-
SHA256
f0288830045f8605da293d536aa041696b00e1bc8a4fe8b878073eb583e106ea
-
SHA512
ada9b063db1736be6c38406e775018ebd89f7d159859fe4de3fcd35a84455acb900c3e3857bd0e8ab1fca6aa03baba9c7dec41ff6f5888e22cb432fca38a790c
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QF:zCsanOtEvwDpjR
Behavioral task
behavioral1
Sample
2024-05-22_b6ff6c2df4e769c6c4ecd21bacf558e1_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-22_b6ff6c2df4e769c6c4ecd21bacf558e1_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_b6ff6c2df4e769c6c4ecd21bacf558e1_cryptolocker
-
Size
80KB
-
MD5
b6ff6c2df4e769c6c4ecd21bacf558e1
-
SHA1
8aeef753a80fbcb7be72593695754eff15af5a0b
-
SHA256
f0288830045f8605da293d536aa041696b00e1bc8a4fe8b878073eb583e106ea
-
SHA512
ada9b063db1736be6c38406e775018ebd89f7d159859fe4de3fcd35a84455acb900c3e3857bd0e8ab1fca6aa03baba9c7dec41ff6f5888e22cb432fca38a790c
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QF:zCsanOtEvwDpjR
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-