General
-
Target
2024-06-01_0a6cd4653747d619040039a8e097681e_cryptolocker
-
Size
79KB
-
Sample
240601-wz7gzaah4w
-
MD5
0a6cd4653747d619040039a8e097681e
-
SHA1
33708346515bd4adf4fb9231dde0120292d09ae2
-
SHA256
92b5dcb43b6c7546ad55151e8f72729d31f37524f1c9bda0596a47f2471eaee9
-
SHA512
0f6ac0fa9fd0218c7bb09a58552132fee585d505be3ede3567dbd348ad33732e52eeaa69c6664b460299302a95496ae874298613f4519e20fa3ff46368df0a75
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1F0:T6a+rdOOtEvwDpjNtHP9
Behavioral task
behavioral1
Sample
2024-06-01_0a6cd4653747d619040039a8e097681e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_0a6cd4653747d619040039a8e097681e_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-01_0a6cd4653747d619040039a8e097681e_cryptolocker
-
Size
79KB
-
MD5
0a6cd4653747d619040039a8e097681e
-
SHA1
33708346515bd4adf4fb9231dde0120292d09ae2
-
SHA256
92b5dcb43b6c7546ad55151e8f72729d31f37524f1c9bda0596a47f2471eaee9
-
SHA512
0f6ac0fa9fd0218c7bb09a58552132fee585d505be3ede3567dbd348ad33732e52eeaa69c6664b460299302a95496ae874298613f4519e20fa3ff46368df0a75
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1F0:T6a+rdOOtEvwDpjNtHP9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-