General
-
Target
2024-06-02_877f9719367baa6969f0382af95cda66_cryptolocker
-
Size
37KB
-
Sample
240602-2ck84sad27
-
MD5
877f9719367baa6969f0382af95cda66
-
SHA1
b1d6441b73eb9a257d02c2d75aad60ed9742a717
-
SHA256
2252f5ec9e70d9c41d26e8817fdaeb58acb880d4a6bd57572965592a283ba10a
-
SHA512
49ac375138eb7365cf7d5bad794011c283be5ab8e68ee372806a59b795f01a21247f6725d24127d94c475381acd39dbe50ebb7f8394e0c1ba72ca6b9a73f1d24
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3VKLZ:qUmnpomddpMOtEvwDpjjaYaQQZ
Behavioral task
behavioral1
Sample
2024-06-02_877f9719367baa6969f0382af95cda66_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-02_877f9719367baa6969f0382af95cda66_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-02_877f9719367baa6969f0382af95cda66_cryptolocker
-
Size
37KB
-
MD5
877f9719367baa6969f0382af95cda66
-
SHA1
b1d6441b73eb9a257d02c2d75aad60ed9742a717
-
SHA256
2252f5ec9e70d9c41d26e8817fdaeb58acb880d4a6bd57572965592a283ba10a
-
SHA512
49ac375138eb7365cf7d5bad794011c283be5ab8e68ee372806a59b795f01a21247f6725d24127d94c475381acd39dbe50ebb7f8394e0c1ba72ca6b9a73f1d24
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3VKLZ:qUmnpomddpMOtEvwDpjjaYaQQZ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-