General
-
Target
2024-05-23_71c8dd7c59b6a60ed8c11913f0e12c5b_cryptolocker
-
Size
90KB
-
Sample
240523-zyf56sge5v
-
MD5
71c8dd7c59b6a60ed8c11913f0e12c5b
-
SHA1
56a4b0aeaffe392b2b66a045492b9481642e828d
-
SHA256
aba4c8f78e32d318d674c0de1c1db63c57a4f06ef729d1125852bbd01d435ce2
-
SHA512
39a4e8f7d6473e84e1d130ca3688b656a1afaaae0a5119cccea8ec77be297f78541b77d6fc493f8530ace087d76e2c25c15a7e022467a876240a38cf42e484ad
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIi5:AnBdOOtEvwDpj6zH
Behavioral task
behavioral1
Sample
2024-05-23_71c8dd7c59b6a60ed8c11913f0e12c5b_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_71c8dd7c59b6a60ed8c11913f0e12c5b_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-23_71c8dd7c59b6a60ed8c11913f0e12c5b_cryptolocker
-
Size
90KB
-
MD5
71c8dd7c59b6a60ed8c11913f0e12c5b
-
SHA1
56a4b0aeaffe392b2b66a045492b9481642e828d
-
SHA256
aba4c8f78e32d318d674c0de1c1db63c57a4f06ef729d1125852bbd01d435ce2
-
SHA512
39a4e8f7d6473e84e1d130ca3688b656a1afaaae0a5119cccea8ec77be297f78541b77d6fc493f8530ace087d76e2c25c15a7e022467a876240a38cf42e484ad
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIi5:AnBdOOtEvwDpj6zH
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-