General
-
Target
2024-05-22_bad26cb3a73258084d90a854b6e37532_cryptolocker
-
Size
39KB
-
Sample
240522-ysws1aee5t
-
MD5
bad26cb3a73258084d90a854b6e37532
-
SHA1
8a5984a045a6683cc74607708fa1da65839dcf0e
-
SHA256
0c19861a669e64d2d393372dd1201468ca772d1264a02bfd673704cf15c8021f
-
SHA512
543ff3db0d9c270ea1c2dc7f7a0c23163e4d9001a83380738a95d2a3aa2ef51ad84bfabf8a2ae0a5a56e16ea9c61ee361c7cf5cef9e2dd8ae37cc06994817410
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/T:qDdFJy3QMOtEvwDpjjWMl7Ty
Behavioral task
behavioral1
Sample
2024-05-22_bad26cb3a73258084d90a854b6e37532_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_bad26cb3a73258084d90a854b6e37532_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-22_bad26cb3a73258084d90a854b6e37532_cryptolocker
-
Size
39KB
-
MD5
bad26cb3a73258084d90a854b6e37532
-
SHA1
8a5984a045a6683cc74607708fa1da65839dcf0e
-
SHA256
0c19861a669e64d2d393372dd1201468ca772d1264a02bfd673704cf15c8021f
-
SHA512
543ff3db0d9c270ea1c2dc7f7a0c23163e4d9001a83380738a95d2a3aa2ef51ad84bfabf8a2ae0a5a56e16ea9c61ee361c7cf5cef9e2dd8ae37cc06994817410
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/T:qDdFJy3QMOtEvwDpjjWMl7Ty
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-