General
-
Target
2024-06-01_1ac30f870574d3bef484d671d11413ae_cryptolocker
-
Size
71KB
-
Sample
240601-qa5n7ada3s
-
MD5
1ac30f870574d3bef484d671d11413ae
-
SHA1
beea14b23d6d737b3de447a08f2f44b48fb50f4e
-
SHA256
52bb9c3e72e991fe28de0a3cb568c9e0bb8856727830bb75a99f092fb9804611
-
SHA512
b15e8c163d7ba23bd5351c01f22eddf3a1263c8c55b597cfbca4b5c71c92eefc90524e38b8c2418e4edee47fbb72d05677e16c1e79dc4c4b31a1212c32ce7167
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95OJ:C4Q2c94OtEvwDpj4H8zr
Behavioral task
behavioral1
Sample
2024-06-01_1ac30f870574d3bef484d671d11413ae_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_1ac30f870574d3bef484d671d11413ae_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-01_1ac30f870574d3bef484d671d11413ae_cryptolocker
-
Size
71KB
-
MD5
1ac30f870574d3bef484d671d11413ae
-
SHA1
beea14b23d6d737b3de447a08f2f44b48fb50f4e
-
SHA256
52bb9c3e72e991fe28de0a3cb568c9e0bb8856727830bb75a99f092fb9804611
-
SHA512
b15e8c163d7ba23bd5351c01f22eddf3a1263c8c55b597cfbca4b5c71c92eefc90524e38b8c2418e4edee47fbb72d05677e16c1e79dc4c4b31a1212c32ce7167
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95OJ:C4Q2c94OtEvwDpj4H8zr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-