General
-
Target
2024-05-30_1b59d37c2d0fc309eea0e3906e17ed64_cryptolocker
-
Size
90KB
-
Sample
240530-g9cb9aad37
-
MD5
1b59d37c2d0fc309eea0e3906e17ed64
-
SHA1
a533fc0efd14ff91411790bacf33ef9895849507
-
SHA256
5a7f44b12704457527c5ceb47d8764e20167c3a2fa83e05251a2b653be9fc01c
-
SHA512
03d3b96e5bd016a12681b094990e49fadce4996b86d5e5005ee3546a81ae23a24def1aede1530b576297ceda431cb0716b7fc02f5ee03b0e5ed5b8b662a4daff
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/x:n6a+1SEOtEvwDpjYYvQd2Py
Behavioral task
behavioral1
Sample
2024-05-30_1b59d37c2d0fc309eea0e3906e17ed64_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_1b59d37c2d0fc309eea0e3906e17ed64_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-30_1b59d37c2d0fc309eea0e3906e17ed64_cryptolocker
-
Size
90KB
-
MD5
1b59d37c2d0fc309eea0e3906e17ed64
-
SHA1
a533fc0efd14ff91411790bacf33ef9895849507
-
SHA256
5a7f44b12704457527c5ceb47d8764e20167c3a2fa83e05251a2b653be9fc01c
-
SHA512
03d3b96e5bd016a12681b094990e49fadce4996b86d5e5005ee3546a81ae23a24def1aede1530b576297ceda431cb0716b7fc02f5ee03b0e5ed5b8b662a4daff
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/x:n6a+1SEOtEvwDpjYYvQd2Py
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-