General
-
Target
2024-05-29_77bb61fad9866754ab20c57d1766e697_cryptolocker
-
Size
72KB
-
Sample
240529-hettgsdf3x
-
MD5
77bb61fad9866754ab20c57d1766e697
-
SHA1
e269c3ab445f89635d92bcdf3d73e570ae329072
-
SHA256
959c23274eafae1cad721e1beecaee0fbc971d8fea4fe88199f040777242e332
-
SHA512
9703c3b9b798646cae61333486ef7b845038deea29b6788458f906bac1327b85e824ca9236bbab6960fa8b11ff0a20d28b3ad00be200184ffc72ae798c3ce4c2
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs97x+:C4Q2c94OtEvwDpj4H8zZ
Behavioral task
behavioral1
Sample
2024-05-29_77bb61fad9866754ab20c57d1766e697_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-29_77bb61fad9866754ab20c57d1766e697_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-29_77bb61fad9866754ab20c57d1766e697_cryptolocker
-
Size
72KB
-
MD5
77bb61fad9866754ab20c57d1766e697
-
SHA1
e269c3ab445f89635d92bcdf3d73e570ae329072
-
SHA256
959c23274eafae1cad721e1beecaee0fbc971d8fea4fe88199f040777242e332
-
SHA512
9703c3b9b798646cae61333486ef7b845038deea29b6788458f906bac1327b85e824ca9236bbab6960fa8b11ff0a20d28b3ad00be200184ffc72ae798c3ce4c2
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs97x+:C4Q2c94OtEvwDpj4H8zZ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-