General
-
Target
2024-05-22_41f637b48896f62788d664e93e36b248_cryptolocker
-
Size
40KB
-
Sample
240522-ywy3jaef8y
-
MD5
41f637b48896f62788d664e93e36b248
-
SHA1
75f9fcef0a18b5f83c6e2655a0a754b9f5f812c4
-
SHA256
2b5e6ecf8b80d9adf99085136aa5c5dcfd7f1e197f65eab7dde29235aa9e1c1c
-
SHA512
3106fdeff83fedd0e9c276dc7f16a13ecf536e7a77ee60042937bf20e035e53ff62b874122a64f84f912426d9ef106f5f26e06493a1ce9826d67d26e331a9008
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBY:qDdFJy3QMOtEvwDpjjWMl7Tdq
Behavioral task
behavioral1
Sample
2024-05-22_41f637b48896f62788d664e93e36b248_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_41f637b48896f62788d664e93e36b248_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_41f637b48896f62788d664e93e36b248_cryptolocker
-
Size
40KB
-
MD5
41f637b48896f62788d664e93e36b248
-
SHA1
75f9fcef0a18b5f83c6e2655a0a754b9f5f812c4
-
SHA256
2b5e6ecf8b80d9adf99085136aa5c5dcfd7f1e197f65eab7dde29235aa9e1c1c
-
SHA512
3106fdeff83fedd0e9c276dc7f16a13ecf536e7a77ee60042937bf20e035e53ff62b874122a64f84f912426d9ef106f5f26e06493a1ce9826d67d26e331a9008
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBY:qDdFJy3QMOtEvwDpjjWMl7Tdq
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-