General
-
Target
2024-05-24_ad521d1ac7929b4939062d58514cdd28_cryptolocker
-
Size
69KB
-
Sample
240524-ejqqvacc6z
-
MD5
ad521d1ac7929b4939062d58514cdd28
-
SHA1
7e841ab2488af39dff583812e82d3edf7e17e104
-
SHA256
c3ad8337208c5baf8f10f46bc7a370f9aaa9dac4c16409c0235a064c308ccacc
-
SHA512
cdea55fe3d047a48ea0382a8fdb2b374af1f51b4687464d5645311a4aabc421b201598143bd595400df836fb7af68a04ee8555a16b3543fad59ff1537f471a0c
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAe6:78SEOtEvwDpjWYvQd2Pb
Behavioral task
behavioral1
Sample
2024-05-24_ad521d1ac7929b4939062d58514cdd28_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_ad521d1ac7929b4939062d58514cdd28_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-24_ad521d1ac7929b4939062d58514cdd28_cryptolocker
-
Size
69KB
-
MD5
ad521d1ac7929b4939062d58514cdd28
-
SHA1
7e841ab2488af39dff583812e82d3edf7e17e104
-
SHA256
c3ad8337208c5baf8f10f46bc7a370f9aaa9dac4c16409c0235a064c308ccacc
-
SHA512
cdea55fe3d047a48ea0382a8fdb2b374af1f51b4687464d5645311a4aabc421b201598143bd595400df836fb7af68a04ee8555a16b3543fad59ff1537f471a0c
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAe6:78SEOtEvwDpjWYvQd2Pb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-