General
-
Target
2024-05-23_c752ce9e8f582a88c7477b168eccd25b_cryptolocker
-
Size
60KB
-
Sample
240523-a7rktsfe99
-
MD5
c752ce9e8f582a88c7477b168eccd25b
-
SHA1
47da5acef84640116ec7a70f3c929080204b0de1
-
SHA256
3973676bd47470c6a5a2c391ecd2c55664dfd6f39c64fb52a25ccdda9149e7fa
-
SHA512
4f1be7122e1b1c968a88df2b9d063b744caa3cb2a4fa3d8f34e2d202c139282db7d95a444723a34d0f2cea4bd3167f3a6563fcd549129726bda3e72bfea874ae
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pr:H6QFElP6n+gou9cvMOtEvwDpjCpVXl
Behavioral task
behavioral1
Sample
2024-05-23_c752ce9e8f582a88c7477b168eccd25b_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-23_c752ce9e8f582a88c7477b168eccd25b_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-23_c752ce9e8f582a88c7477b168eccd25b_cryptolocker
-
Size
60KB
-
MD5
c752ce9e8f582a88c7477b168eccd25b
-
SHA1
47da5acef84640116ec7a70f3c929080204b0de1
-
SHA256
3973676bd47470c6a5a2c391ecd2c55664dfd6f39c64fb52a25ccdda9149e7fa
-
SHA512
4f1be7122e1b1c968a88df2b9d063b744caa3cb2a4fa3d8f34e2d202c139282db7d95a444723a34d0f2cea4bd3167f3a6563fcd549129726bda3e72bfea874ae
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pr:H6QFElP6n+gou9cvMOtEvwDpjCpVXl
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-