General
-
Target
2024-05-22_545c5d1d7027747e8e54b6fbb54b39da_cryptolocker
-
Size
60KB
-
Sample
240522-zbzzrsff83
-
MD5
545c5d1d7027747e8e54b6fbb54b39da
-
SHA1
6a498af401d5ee093d99a9a858b2bb3acea5b32d
-
SHA256
9a1cc729c2af721f81888c0e92e83419701909b334b0a5c0c5605a97514de834
-
SHA512
5fa3bb029ec38ad43e3f9b65d1d68a81ebae25f3ae4cebdbea41ad481117117403281fe7b96706cd2bd0615944a41d1e447cbfb6011550b456e0ddd27545fce6
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pi:H6QFElP6n+gou9cvMOtEvwDpjCpVX4
Behavioral task
behavioral1
Sample
2024-05-22_545c5d1d7027747e8e54b6fbb54b39da_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_545c5d1d7027747e8e54b6fbb54b39da_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-22_545c5d1d7027747e8e54b6fbb54b39da_cryptolocker
-
Size
60KB
-
MD5
545c5d1d7027747e8e54b6fbb54b39da
-
SHA1
6a498af401d5ee093d99a9a858b2bb3acea5b32d
-
SHA256
9a1cc729c2af721f81888c0e92e83419701909b334b0a5c0c5605a97514de834
-
SHA512
5fa3bb029ec38ad43e3f9b65d1d68a81ebae25f3ae4cebdbea41ad481117117403281fe7b96706cd2bd0615944a41d1e447cbfb6011550b456e0ddd27545fce6
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pi:H6QFElP6n+gou9cvMOtEvwDpjCpVX4
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-