General
-
Target
2024-05-31_874e9772d376af93bce6d235e370ac7c_cryptolocker
-
Size
81KB
-
Sample
240531-tazdysdb4t
-
MD5
874e9772d376af93bce6d235e370ac7c
-
SHA1
8244244d22cf019d1720355b21021233e1700926
-
SHA256
25d51656fc70caad0b86c95e9f46309cfeba2a4c3d381ea77c6e08ca972f46ec
-
SHA512
842b9b90fbc69b188b815522a0248256c49355a22b5bd3165deaebd7977112abb373ee8c967fb11fe7825731215e3cd14b684d9b0c61ae54dfd4cd9cba70676a
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qq:zCsanOtEvwDpjG
Behavioral task
behavioral1
Sample
2024-05-31_874e9772d376af93bce6d235e370ac7c_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-31_874e9772d376af93bce6d235e370ac7c_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-31_874e9772d376af93bce6d235e370ac7c_cryptolocker
-
Size
81KB
-
MD5
874e9772d376af93bce6d235e370ac7c
-
SHA1
8244244d22cf019d1720355b21021233e1700926
-
SHA256
25d51656fc70caad0b86c95e9f46309cfeba2a4c3d381ea77c6e08ca972f46ec
-
SHA512
842b9b90fbc69b188b815522a0248256c49355a22b5bd3165deaebd7977112abb373ee8c967fb11fe7825731215e3cd14b684d9b0c61ae54dfd4cd9cba70676a
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qq:zCsanOtEvwDpjG
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-