General
-
Target
2024-05-24_d80c0813500496c6968b9a3e13f4b685_cryptolocker
-
Size
40KB
-
Sample
240524-y48xpsab48
-
MD5
d80c0813500496c6968b9a3e13f4b685
-
SHA1
ac447a1f8475c996875049b2ed15b5f17fb6fb1d
-
SHA256
158aedb9053efda0c4d577400c17e78b0666a0c475f1a312e81c98f7462cfe88
-
SHA512
c74eb5831faff7d291e0e2108ba43780428a2c4c1538998123eff63e4e68d9d7df11412a2fbee317aa0bbf61300cbea557156e3eb4b42487af6f889f549f40eb
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9h5:qDdFJy3QMOtEvwDpjjWMl7TA
Behavioral task
behavioral1
Sample
2024-05-24_d80c0813500496c6968b9a3e13f4b685_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_d80c0813500496c6968b9a3e13f4b685_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-24_d80c0813500496c6968b9a3e13f4b685_cryptolocker
-
Size
40KB
-
MD5
d80c0813500496c6968b9a3e13f4b685
-
SHA1
ac447a1f8475c996875049b2ed15b5f17fb6fb1d
-
SHA256
158aedb9053efda0c4d577400c17e78b0666a0c475f1a312e81c98f7462cfe88
-
SHA512
c74eb5831faff7d291e0e2108ba43780428a2c4c1538998123eff63e4e68d9d7df11412a2fbee317aa0bbf61300cbea557156e3eb4b42487af6f889f549f40eb
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9h5:qDdFJy3QMOtEvwDpjjWMl7TA
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-