General
-
Target
2024-05-23_52163b410fc4c9b063167d3bbbbc4450_cryptolocker
-
Size
38KB
-
Sample
240523-cyt1psaf3s
-
MD5
52163b410fc4c9b063167d3bbbbc4450
-
SHA1
fbfb17822fa0a03a8c9ef9a1d8f4da2d64cf2651
-
SHA256
42099fa6aeaf87bb786c9fccfdea3edd7c22e91ffe2c5c2e53807b1d982fdc4c
-
SHA512
32591b7c9a8d6c304354196655638c8c965242d1a1e70ea4e0114581b3b41814a3b5ad87a21dfeae3d98a756ae508bced409a18d8f49838d1cad971a8cf12e6f
-
SSDEEP
768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRz:qTJu9cvMOtEvwDpjppVXzRz
Behavioral task
behavioral1
Sample
2024-05-23_52163b410fc4c9b063167d3bbbbc4450_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_52163b410fc4c9b063167d3bbbbc4450_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-23_52163b410fc4c9b063167d3bbbbc4450_cryptolocker
-
Size
38KB
-
MD5
52163b410fc4c9b063167d3bbbbc4450
-
SHA1
fbfb17822fa0a03a8c9ef9a1d8f4da2d64cf2651
-
SHA256
42099fa6aeaf87bb786c9fccfdea3edd7c22e91ffe2c5c2e53807b1d982fdc4c
-
SHA512
32591b7c9a8d6c304354196655638c8c965242d1a1e70ea4e0114581b3b41814a3b5ad87a21dfeae3d98a756ae508bced409a18d8f49838d1cad971a8cf12e6f
-
SSDEEP
768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRz:qTJu9cvMOtEvwDpjppVXzRz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-