General
-
Target
2024-05-23_e19c737f57ef72181cf10bbab2c1aa25_cryptolocker
-
Size
39KB
-
Sample
240523-byrpxagg3x
-
MD5
e19c737f57ef72181cf10bbab2c1aa25
-
SHA1
6cab7f2b29dc999952f267285ca80ceebd0378fb
-
SHA256
d94b15ae9d36cba9649f281f624a05bba0c6e8cad3c5729f072f9f9d0cae233c
-
SHA512
05c0320d370899e78d6b2893137925da81356acba538c31deadfada525403b64e0cf62308c6548cef5a47f6bbe6a17c49951623bb2eb6dd551a742682a3a9bef
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaQZ:qDdFJy3QMOtEvwDpjjWMl7Td8
Behavioral task
behavioral1
Sample
2024-05-23_e19c737f57ef72181cf10bbab2c1aa25_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-23_e19c737f57ef72181cf10bbab2c1aa25_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-23_e19c737f57ef72181cf10bbab2c1aa25_cryptolocker
-
Size
39KB
-
MD5
e19c737f57ef72181cf10bbab2c1aa25
-
SHA1
6cab7f2b29dc999952f267285ca80ceebd0378fb
-
SHA256
d94b15ae9d36cba9649f281f624a05bba0c6e8cad3c5729f072f9f9d0cae233c
-
SHA512
05c0320d370899e78d6b2893137925da81356acba538c31deadfada525403b64e0cf62308c6548cef5a47f6bbe6a17c49951623bb2eb6dd551a742682a3a9bef
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaQZ:qDdFJy3QMOtEvwDpjjWMl7Td8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-