General
-
Target
2024-05-31_5450712359fa4664632dc92798942e02_cryptolocker
-
Size
40KB
-
Sample
240531-w4jlpsgf9t
-
MD5
5450712359fa4664632dc92798942e02
-
SHA1
d8a3db06a40a47cd14b60438eb9b301975f09269
-
SHA256
7700174663b067b8d1e073f7ba65dda2e0a13a44405377c987ff0a2d73c7b43f
-
SHA512
6ee8f0963a4e08fd165e539b5762aeff42df0acd2cb319e1b5ec9f149690ff8d8abccb8ab3f82812f9d20a419bf5bdf9bc1460e8b4890e1d497729d5561653bb
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBc4s:qDdFJy3QMOtEvwDpjjWMl7TdS
Behavioral task
behavioral1
Sample
2024-05-31_5450712359fa4664632dc92798942e02_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-31_5450712359fa4664632dc92798942e02_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-05-31_5450712359fa4664632dc92798942e02_cryptolocker
-
Size
40KB
-
MD5
5450712359fa4664632dc92798942e02
-
SHA1
d8a3db06a40a47cd14b60438eb9b301975f09269
-
SHA256
7700174663b067b8d1e073f7ba65dda2e0a13a44405377c987ff0a2d73c7b43f
-
SHA512
6ee8f0963a4e08fd165e539b5762aeff42df0acd2cb319e1b5ec9f149690ff8d8abccb8ab3f82812f9d20a419bf5bdf9bc1460e8b4890e1d497729d5561653bb
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBc4s:qDdFJy3QMOtEvwDpjjWMl7TdS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-