General
-
Target
2024-06-01_dc76aafc3d5d949c98582509b90a5a0e_cryptolocker
-
Size
79KB
-
Sample
240601-n8evbacf72
-
MD5
dc76aafc3d5d949c98582509b90a5a0e
-
SHA1
205fc5fb0421bc0bc01dd7d01e045c280ec8d434
-
SHA256
034dcac47c168c8a6c07b4128b7bdaa37b60225a26928c2513dff1056b5f57f6
-
SHA512
1e14d04e9c0545d26599fedec7c9b4b3bacb77a7d93821cbb3dbc724716a14a0937fd3b7dd6b9b2ae65ded93c4bd6c4b5fb3e5b74fb44132a5fcc4345add0316
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1FQ:T6a+rdOOtEvwDpjNtHPp
Behavioral task
behavioral1
Sample
2024-06-01_dc76aafc3d5d949c98582509b90a5a0e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_dc76aafc3d5d949c98582509b90a5a0e_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-01_dc76aafc3d5d949c98582509b90a5a0e_cryptolocker
-
Size
79KB
-
MD5
dc76aafc3d5d949c98582509b90a5a0e
-
SHA1
205fc5fb0421bc0bc01dd7d01e045c280ec8d434
-
SHA256
034dcac47c168c8a6c07b4128b7bdaa37b60225a26928c2513dff1056b5f57f6
-
SHA512
1e14d04e9c0545d26599fedec7c9b4b3bacb77a7d93821cbb3dbc724716a14a0937fd3b7dd6b9b2ae65ded93c4bd6c4b5fb3e5b74fb44132a5fcc4345add0316
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1FQ:T6a+rdOOtEvwDpjNtHPp
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-