General
-
Target
2024-06-01_31d6735ef0a978ab01a7baffec6a3b79_cryptolocker
-
Size
34KB
-
Sample
240601-x7hdgsdc92
-
MD5
31d6735ef0a978ab01a7baffec6a3b79
-
SHA1
0f4dedc0847bbccd99334e1b7064ee57e7d45a5e
-
SHA256
f51b5e50fb0020998d3e7f3de0a3d02c61e035f516ead1a793502a893c6aa0ff
-
SHA512
36e1e56a0a4162e8fa748cf4dfaf81fc88263f068272c3f495635240b64111e74ff3f1e04500dc542bb53f9998977b0c7d96071a03af73f6ba08d87b2ed79c2f
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcs82uMuCW:b/yC4GyNM01GuQMNXw2PSjSKkc9/MY
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_31d6735ef0a978ab01a7baffec6a3b79_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-01_31d6735ef0a978ab01a7baffec6a3b79_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-01_31d6735ef0a978ab01a7baffec6a3b79_cryptolocker
-
Size
34KB
-
MD5
31d6735ef0a978ab01a7baffec6a3b79
-
SHA1
0f4dedc0847bbccd99334e1b7064ee57e7d45a5e
-
SHA256
f51b5e50fb0020998d3e7f3de0a3d02c61e035f516ead1a793502a893c6aa0ff
-
SHA512
36e1e56a0a4162e8fa748cf4dfaf81fc88263f068272c3f495635240b64111e74ff3f1e04500dc542bb53f9998977b0c7d96071a03af73f6ba08d87b2ed79c2f
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcs82uMuCW:b/yC4GyNM01GuQMNXw2PSjSKkc9/MY
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-