General
-
Target
2024-06-02_ac9e2918ae71993005d99dce5448afcc_cryptolocker
-
Size
89KB
-
Sample
240602-ed4eraaa2s
-
MD5
ac9e2918ae71993005d99dce5448afcc
-
SHA1
32f0b3fc89855464ba656904049942e90d0d564a
-
SHA256
e28dccf51c621b1c4e73d327688e9d8fd02f5f0cecb09bb82a2ad44b6d97de48
-
SHA512
e59cb0b57c40acfdf8243cb19cfff6bf756a7d5640a0a2b8dabbb7403724666980905c491664768bd5982e40138ba4c00928c1f2a39b9013883dff8fe0db676b
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIOD3:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgJ
Behavioral task
behavioral1
Sample
2024-06-02_ac9e2918ae71993005d99dce5448afcc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-02_ac9e2918ae71993005d99dce5448afcc_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-02_ac9e2918ae71993005d99dce5448afcc_cryptolocker
-
Size
89KB
-
MD5
ac9e2918ae71993005d99dce5448afcc
-
SHA1
32f0b3fc89855464ba656904049942e90d0d564a
-
SHA256
e28dccf51c621b1c4e73d327688e9d8fd02f5f0cecb09bb82a2ad44b6d97de48
-
SHA512
e59cb0b57c40acfdf8243cb19cfff6bf756a7d5640a0a2b8dabbb7403724666980905c491664768bd5982e40138ba4c00928c1f2a39b9013883dff8fe0db676b
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIOD3:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgJ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-