General
-
Target
2024-05-24_81773433bba4c2a8a53b47db832586cd_cryptolocker
-
Size
60KB
-
Sample
240524-zabwjsad57
-
MD5
81773433bba4c2a8a53b47db832586cd
-
SHA1
6fd1bf57aedd51e27d3eb1f9db5db40ba2b57a2d
-
SHA256
444a67cc162518fa159adb05ca5c0c7b1dd86ac9c92de0cde2b2441211a395ed
-
SHA512
7f388012ac22e888424cf561d7adbfb741151ae5f54e7912255feff8395b67211452c546b457dbb4f7d88b5002afd3de0c756523771d601ec959da2f4419a7c8
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pt:H6QFElP6n+gou9cvMOtEvwDpjCpVXT
Behavioral task
behavioral1
Sample
2024-05-24_81773433bba4c2a8a53b47db832586cd_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-24_81773433bba4c2a8a53b47db832586cd_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-24_81773433bba4c2a8a53b47db832586cd_cryptolocker
-
Size
60KB
-
MD5
81773433bba4c2a8a53b47db832586cd
-
SHA1
6fd1bf57aedd51e27d3eb1f9db5db40ba2b57a2d
-
SHA256
444a67cc162518fa159adb05ca5c0c7b1dd86ac9c92de0cde2b2441211a395ed
-
SHA512
7f388012ac22e888424cf561d7adbfb741151ae5f54e7912255feff8395b67211452c546b457dbb4f7d88b5002afd3de0c756523771d601ec959da2f4419a7c8
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pt:H6QFElP6n+gou9cvMOtEvwDpjCpVXT
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-