General
-
Target
2024-05-26_c7624134388926b80b865f970d8da983_cryptolocker
-
Size
38KB
-
Sample
240526-egj6aaeg29
-
MD5
c7624134388926b80b865f970d8da983
-
SHA1
6103b152b0e89bc947b2e2b74367fe126f979e45
-
SHA256
2190c933ce951957bc36592f8b011bbdf7cce013efd772832a479fef8b80c939
-
SHA512
e0ac20461952906dd1a4327d54797b5d5bd42830f3001d517f274b4f145320e62666c70a382cb8b100d89f98a1ff7cea84024019c11c94155ec06774c2d1344a
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYt:qDdFJy3QMOtEvwDpjjWMl7TI
Behavioral task
behavioral1
Sample
2024-05-26_c7624134388926b80b865f970d8da983_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-26_c7624134388926b80b865f970d8da983_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-26_c7624134388926b80b865f970d8da983_cryptolocker
-
Size
38KB
-
MD5
c7624134388926b80b865f970d8da983
-
SHA1
6103b152b0e89bc947b2e2b74367fe126f979e45
-
SHA256
2190c933ce951957bc36592f8b011bbdf7cce013efd772832a479fef8b80c939
-
SHA512
e0ac20461952906dd1a4327d54797b5d5bd42830f3001d517f274b4f145320e62666c70a382cb8b100d89f98a1ff7cea84024019c11c94155ec06774c2d1344a
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYt:qDdFJy3QMOtEvwDpjjWMl7TI
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-