General
-
Target
2024-05-27_17dc357b9a0bec511d08f76196bec1e8_cryptolocker
-
Size
89KB
-
Sample
240527-e2c8gaha85
-
MD5
17dc357b9a0bec511d08f76196bec1e8
-
SHA1
38f5457542582c1c49d0105e4044a2dff40a8277
-
SHA256
9cc4cde6ac6ad892ef05f7945536b6c258481a79265ff444ea9d2ff1386cc4f9
-
SHA512
1be97b47d0e6d465524a807118231beb42664031b72164113e4b28f422609eda26d6347b6f512ea582647b117076477cc4beb41494099b1f5aea459eeef3da97
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODwt:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg0
Behavioral task
behavioral1
Sample
2024-05-27_17dc357b9a0bec511d08f76196bec1e8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_17dc357b9a0bec511d08f76196bec1e8_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-27_17dc357b9a0bec511d08f76196bec1e8_cryptolocker
-
Size
89KB
-
MD5
17dc357b9a0bec511d08f76196bec1e8
-
SHA1
38f5457542582c1c49d0105e4044a2dff40a8277
-
SHA256
9cc4cde6ac6ad892ef05f7945536b6c258481a79265ff444ea9d2ff1386cc4f9
-
SHA512
1be97b47d0e6d465524a807118231beb42664031b72164113e4b28f422609eda26d6347b6f512ea582647b117076477cc4beb41494099b1f5aea459eeef3da97
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODwt:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-