General
-
Target
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker
-
Size
24KB
-
Sample
240530-1e17nsac3v
-
MD5
b005f9ff9539cc8f94d65740e0334a64
-
SHA1
7bb45b69cf395f6d936a8c710caf5cabcae72319
-
SHA256
dee5cdd41a74346fc5df51ca96e8e1a0d2b3d8ad945e97739eff9b919667770d
-
SHA512
a9de15539002a891e1b0c43017f91cb87ff07eecdf4b8a423bfd288665d7a5d9287fdd1554851041f6dcba4f4760de17c1054ce548b4f3619a386f64fb8dbc39
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBdaT:bVCPwFRo6CpwXFXSqQXfjAsmHBdG
Behavioral task
behavioral1
Sample
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker
-
Size
24KB
-
MD5
b005f9ff9539cc8f94d65740e0334a64
-
SHA1
7bb45b69cf395f6d936a8c710caf5cabcae72319
-
SHA256
dee5cdd41a74346fc5df51ca96e8e1a0d2b3d8ad945e97739eff9b919667770d
-
SHA512
a9de15539002a891e1b0c43017f91cb87ff07eecdf4b8a423bfd288665d7a5d9287fdd1554851041f6dcba4f4760de17c1054ce548b4f3619a386f64fb8dbc39
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBdaT:bVCPwFRo6CpwXFXSqQXfjAsmHBdG
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-