General
-
Target
2024-05-23_10b25386bc32e25f67bc03a4f4ed7ce9_cryptolocker
-
Size
60KB
-
Sample
240523-aqj5esef5y
-
MD5
10b25386bc32e25f67bc03a4f4ed7ce9
-
SHA1
2052c3bd6e94b75619779b2c8a5bf24a6ab4c160
-
SHA256
e4fc241496bd0c1ff886bbb7560fce1e1797e3b2d89e39e5c9895a3e6e6d83a5
-
SHA512
910c8e98ff799dfc4ff7fc50246e3fa8b4a8b12ae3c7ff670a4f0a66647bf53445c8f333de6a4ed86bde068b7002e3cc904407019fa21886202febfd7d448763
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3y:z6a+CdOOtEvwDpjQ1
Behavioral task
behavioral1
Sample
2024-05-23_10b25386bc32e25f67bc03a4f4ed7ce9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-23_10b25386bc32e25f67bc03a4f4ed7ce9_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-23_10b25386bc32e25f67bc03a4f4ed7ce9_cryptolocker
-
Size
60KB
-
MD5
10b25386bc32e25f67bc03a4f4ed7ce9
-
SHA1
2052c3bd6e94b75619779b2c8a5bf24a6ab4c160
-
SHA256
e4fc241496bd0c1ff886bbb7560fce1e1797e3b2d89e39e5c9895a3e6e6d83a5
-
SHA512
910c8e98ff799dfc4ff7fc50246e3fa8b4a8b12ae3c7ff670a4f0a66647bf53445c8f333de6a4ed86bde068b7002e3cc904407019fa21886202febfd7d448763
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3y:z6a+CdOOtEvwDpjQ1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-