General
-
Target
2024-05-23_6b1dbd5297ef57b9ada719cd7307e3b0_cryptolocker
-
Size
59KB
-
Sample
240523-wr81tsbd4t
-
MD5
6b1dbd5297ef57b9ada719cd7307e3b0
-
SHA1
23d1cfb5f18cf87b6a1ebd7c6caef8f39ba97dae
-
SHA256
9aa52163ef7cd7dc6cb54ed31ea93633f9446da8ebff8402b38a0b47b2413d3b
-
SHA512
c704236b6dbc2c46354b15872417a73f254fe14f59f668f849d2a49a71b6f34a1e751683917bf2af52233610bc32d5d290b960f6038ddc899b6c5d731d99b0ff
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axK3ZM:z6QFElP6n+gKmddpMOtEvwDpj9aYaQZM
Behavioral task
behavioral1
Sample
2024-05-23_6b1dbd5297ef57b9ada719cd7307e3b0_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_6b1dbd5297ef57b9ada719cd7307e3b0_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-23_6b1dbd5297ef57b9ada719cd7307e3b0_cryptolocker
-
Size
59KB
-
MD5
6b1dbd5297ef57b9ada719cd7307e3b0
-
SHA1
23d1cfb5f18cf87b6a1ebd7c6caef8f39ba97dae
-
SHA256
9aa52163ef7cd7dc6cb54ed31ea93633f9446da8ebff8402b38a0b47b2413d3b
-
SHA512
c704236b6dbc2c46354b15872417a73f254fe14f59f668f849d2a49a71b6f34a1e751683917bf2af52233610bc32d5d290b960f6038ddc899b6c5d731d99b0ff
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axK3ZM:z6QFElP6n+gKmddpMOtEvwDpj9aYaQZM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-