General
-
Target
2024-05-29_cdab87ad571fe407eda2e2fe986b1443_cryptolocker
-
Size
53KB
-
Sample
240529-t8cb3sbf9s
-
MD5
cdab87ad571fe407eda2e2fe986b1443
-
SHA1
94c2ff84a6806be48e9ffc65853b3d018838a15a
-
SHA256
c62fbac09fd71f39a8f4b7cb158545db53f8deea18c11d1d71f1e8867d012a65
-
SHA512
612e2b581a2b8e831d01e3dd1510562931027c7606a2b534a6fb361b882578cfda2bf976fb7cff6d725085b32eead44864381c6358a179a9900dcae72537652c
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXr:bODOw9acifAoc+vw
Behavioral task
behavioral1
Sample
2024-05-29_cdab87ad571fe407eda2e2fe986b1443_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_cdab87ad571fe407eda2e2fe986b1443_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-29_cdab87ad571fe407eda2e2fe986b1443_cryptolocker
-
Size
53KB
-
MD5
cdab87ad571fe407eda2e2fe986b1443
-
SHA1
94c2ff84a6806be48e9ffc65853b3d018838a15a
-
SHA256
c62fbac09fd71f39a8f4b7cb158545db53f8deea18c11d1d71f1e8867d012a65
-
SHA512
612e2b581a2b8e831d01e3dd1510562931027c7606a2b534a6fb361b882578cfda2bf976fb7cff6d725085b32eead44864381c6358a179a9900dcae72537652c
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXr:bODOw9acifAoc+vw
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-