General
-
Target
2024-05-30_0ccddde964e6d50004c838a525329a63_cryptolocker
-
Size
40KB
-
Sample
240530-e1646afd95
-
MD5
0ccddde964e6d50004c838a525329a63
-
SHA1
849ec440a402bb385116e72eebcb1a062181eab8
-
SHA256
2439b0d7e528be207682691292d70169f688ebaab7bb7c532716c279169941be
-
SHA512
6f93125d5a5f2890133ee4a128698198b659ae0b93e4211824af6109eaf41f9ef6918ba66d9b0104aed6c3a25cb1efe3eb23fe5e6aa1e1c5a1e4615c36364897
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY4:qDdFJy3QMOtEvwDpjjWMl7TF
Behavioral task
behavioral1
Sample
2024-05-30_0ccddde964e6d50004c838a525329a63_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-30_0ccddde964e6d50004c838a525329a63_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-30_0ccddde964e6d50004c838a525329a63_cryptolocker
-
Size
40KB
-
MD5
0ccddde964e6d50004c838a525329a63
-
SHA1
849ec440a402bb385116e72eebcb1a062181eab8
-
SHA256
2439b0d7e528be207682691292d70169f688ebaab7bb7c532716c279169941be
-
SHA512
6f93125d5a5f2890133ee4a128698198b659ae0b93e4211824af6109eaf41f9ef6918ba66d9b0104aed6c3a25cb1efe3eb23fe5e6aa1e1c5a1e4615c36364897
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY4:qDdFJy3QMOtEvwDpjjWMl7TF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-