General
-
Target
2024-05-27_3d97ad5cda900c6ed47b0b12f67d697a_cryptolocker
-
Size
95KB
-
Sample
240527-w3k35sec67
-
MD5
3d97ad5cda900c6ed47b0b12f67d697a
-
SHA1
d8b9096a16aeffa43ee941d5dde2048388fc038e
-
SHA256
253c5a04f8cdc7d1910fb1a7c8ed00d4e494b23e8ceda6b0eb0e837be55ac93d
-
SHA512
3aed367e616c7eac0d40fafaa1c8dc5d839dcd70de11aeb60a3f48f5b10c18b90989034fdc1c5734393df22d34a4b1a1cabd6684c12eb4f4560c0b7bf15549fe
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kb:zCsanOtEvwDpjBQ
Behavioral task
behavioral1
Sample
2024-05-27_3d97ad5cda900c6ed47b0b12f67d697a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_3d97ad5cda900c6ed47b0b12f67d697a_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-27_3d97ad5cda900c6ed47b0b12f67d697a_cryptolocker
-
Size
95KB
-
MD5
3d97ad5cda900c6ed47b0b12f67d697a
-
SHA1
d8b9096a16aeffa43ee941d5dde2048388fc038e
-
SHA256
253c5a04f8cdc7d1910fb1a7c8ed00d4e494b23e8ceda6b0eb0e837be55ac93d
-
SHA512
3aed367e616c7eac0d40fafaa1c8dc5d839dcd70de11aeb60a3f48f5b10c18b90989034fdc1c5734393df22d34a4b1a1cabd6684c12eb4f4560c0b7bf15549fe
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kb:zCsanOtEvwDpjBQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-