General
-
Target
2024-05-22_41ce7e02a2f0b4b3cf0b47945dfe1010_cryptolocker
-
Size
66KB
-
Sample
240522-yk91naed34
-
MD5
41ce7e02a2f0b4b3cf0b47945dfe1010
-
SHA1
1c217c0de075123fa233dea82c004b3c1d3a441a
-
SHA256
a2860335be42f88e35d216d24b1f64ffe76bcbaa6e54786cbf433008320c8142
-
SHA512
96ce6ebb32468091208ff5c642dc4144e34399f739cd9f2e0b97822fe5d389b54110253625a9f3a6685bd9579f07af514c4d69f5952a2255e9ec6d295a16981e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRm:1nK6a+qdOOtEvwDpjX
Behavioral task
behavioral1
Sample
2024-05-22_41ce7e02a2f0b4b3cf0b47945dfe1010_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_41ce7e02a2f0b4b3cf0b47945dfe1010_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_41ce7e02a2f0b4b3cf0b47945dfe1010_cryptolocker
-
Size
66KB
-
MD5
41ce7e02a2f0b4b3cf0b47945dfe1010
-
SHA1
1c217c0de075123fa233dea82c004b3c1d3a441a
-
SHA256
a2860335be42f88e35d216d24b1f64ffe76bcbaa6e54786cbf433008320c8142
-
SHA512
96ce6ebb32468091208ff5c642dc4144e34399f739cd9f2e0b97822fe5d389b54110253625a9f3a6685bd9579f07af514c4d69f5952a2255e9ec6d295a16981e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRm:1nK6a+qdOOtEvwDpjX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-