General
-
Target
2024-05-30_8e3317ee7c57be227c59c5ab9f097bab_cryptolocker
-
Size
95KB
-
Sample
240530-em6apsdh3x
-
MD5
8e3317ee7c57be227c59c5ab9f097bab
-
SHA1
2b19f6ff5b46bff3577176fb1c3cb4c292a23913
-
SHA256
c77932d3634175aafdaa1fc7ae3a12c029c14dea98b25f0bf17da61bcbaaea68
-
SHA512
7018bf125c2de24c869fdfa887ac066a88a2ccf5c12dcd719409113c829d63cd4abd3c03d37511cc2084fde777477939cb120d6138a871d867b99c630a7e935b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kQ:zCsanOtEvwDpjBj
Behavioral task
behavioral1
Sample
2024-05-30_8e3317ee7c57be227c59c5ab9f097bab_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_8e3317ee7c57be227c59c5ab9f097bab_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-30_8e3317ee7c57be227c59c5ab9f097bab_cryptolocker
-
Size
95KB
-
MD5
8e3317ee7c57be227c59c5ab9f097bab
-
SHA1
2b19f6ff5b46bff3577176fb1c3cb4c292a23913
-
SHA256
c77932d3634175aafdaa1fc7ae3a12c029c14dea98b25f0bf17da61bcbaaea68
-
SHA512
7018bf125c2de24c869fdfa887ac066a88a2ccf5c12dcd719409113c829d63cd4abd3c03d37511cc2084fde777477939cb120d6138a871d867b99c630a7e935b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kQ:zCsanOtEvwDpjBj
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-