General
-
Target
2024-05-22_3c16b2af9e7d69a05beb77018e2b0853_cryptolocker
-
Size
79KB
-
Sample
240522-cxsq9ahd74
-
MD5
3c16b2af9e7d69a05beb77018e2b0853
-
SHA1
c22069e7960d1e8e9039047ef81a8602cdfb453d
-
SHA256
5730260112813c0513757bc8782a73c26a12d971b4a2f8c1e0d27cb36ef7856f
-
SHA512
6959736b7957cc449817bc2c18f41b0c79c38a6018c5ed7a251f46c1bf6ccc634c9f110efdc949a5fe6c2ca4e4e699cc3bc47cea2c41b78d369e2cf416e9d5e7
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRg:T6a+rdOOtEvwDpjNtF
Behavioral task
behavioral1
Sample
2024-05-22_3c16b2af9e7d69a05beb77018e2b0853_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_3c16b2af9e7d69a05beb77018e2b0853_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_3c16b2af9e7d69a05beb77018e2b0853_cryptolocker
-
Size
79KB
-
MD5
3c16b2af9e7d69a05beb77018e2b0853
-
SHA1
c22069e7960d1e8e9039047ef81a8602cdfb453d
-
SHA256
5730260112813c0513757bc8782a73c26a12d971b4a2f8c1e0d27cb36ef7856f
-
SHA512
6959736b7957cc449817bc2c18f41b0c79c38a6018c5ed7a251f46c1bf6ccc634c9f110efdc949a5fe6c2ca4e4e699cc3bc47cea2c41b78d369e2cf416e9d5e7
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRg:T6a+rdOOtEvwDpjNtF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-