General
-
Target
2024-05-30_77f5cca9da87d72c50c8db8eebd53614_cryptolocker
-
Size
47KB
-
Sample
240530-z4sfdsbc43
-
MD5
77f5cca9da87d72c50c8db8eebd53614
-
SHA1
a85863ece983e90c8106635704496d14f7e50916
-
SHA256
3fec955cf2ce513d4f7f789b4a5edffb4207116ce0b7dff67627470bd7b9a5c8
-
SHA512
2209b97a2631e90bed607c841fb250d9f34a520e2741a93108caeecf26538e918cea61ad4ce300ca3e02376b7aedff94eb0133d32096d0c4ea065b0e6c9a3890
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAVV:qmbhXDmjr5MOtEvwDpj5cDtKkQZQWV
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_77f5cca9da87d72c50c8db8eebd53614_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-30_77f5cca9da87d72c50c8db8eebd53614_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-30_77f5cca9da87d72c50c8db8eebd53614_cryptolocker
-
Size
47KB
-
MD5
77f5cca9da87d72c50c8db8eebd53614
-
SHA1
a85863ece983e90c8106635704496d14f7e50916
-
SHA256
3fec955cf2ce513d4f7f789b4a5edffb4207116ce0b7dff67627470bd7b9a5c8
-
SHA512
2209b97a2631e90bed607c841fb250d9f34a520e2741a93108caeecf26538e918cea61ad4ce300ca3e02376b7aedff94eb0133d32096d0c4ea065b0e6c9a3890
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAVV:qmbhXDmjr5MOtEvwDpj5cDtKkQZQWV
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-