General
-
Target
2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker
-
Size
24KB
-
Sample
240601-lkm5nshg73
-
MD5
9d0a2f749759db1384ceb39e90785f0f
-
SHA1
d3f0e753a92f91910a2faa9bc6d96ebcb8c89871
-
SHA256
d13e403c9344d4de6fe9c1815e3880013b0e81d0b9fdee914c0459492f3c025c
-
SHA512
19cfa8127b3aa665acb5ef73b2fad200e4d65d2c08113b0da82a00373aa1012658468851357b7690950d0149a2e640b6ec08d0b1c57f87f787daa88680fe06cc
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHB/:bVCPwFRo6CpwXFXSqQXfjAsmHB/
Behavioral task
behavioral1
Sample
2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker
-
Size
24KB
-
MD5
9d0a2f749759db1384ceb39e90785f0f
-
SHA1
d3f0e753a92f91910a2faa9bc6d96ebcb8c89871
-
SHA256
d13e403c9344d4de6fe9c1815e3880013b0e81d0b9fdee914c0459492f3c025c
-
SHA512
19cfa8127b3aa665acb5ef73b2fad200e4d65d2c08113b0da82a00373aa1012658468851357b7690950d0149a2e640b6ec08d0b1c57f87f787daa88680fe06cc
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHB/:bVCPwFRo6CpwXFXSqQXfjAsmHB/
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-