General
-
Target
2024-06-02_b760e7dc083f0f45b6db14257826901a_cryptolocker
-
Size
72KB
-
Sample
240602-ee3vlsaa6t
-
MD5
b760e7dc083f0f45b6db14257826901a
-
SHA1
51ab7acd5254f2392f958e007ef6a647bab52639
-
SHA256
1c3226824b854be092d43d5100f1708ee55839a3c33b9184b39b2aee4c617279
-
SHA512
f2c862e2f82329e76eb70a386ee198f0c74f1955045dad05420f0dda0eea99841537e8a9726d9aed5640686bb87a393c869b175d03bc9b2fbf79416b2965a66c
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95H:C4Q2c94OtEvwDpj4H8zY
Behavioral task
behavioral1
Sample
2024-06-02_b760e7dc083f0f45b6db14257826901a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-02_b760e7dc083f0f45b6db14257826901a_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-02_b760e7dc083f0f45b6db14257826901a_cryptolocker
-
Size
72KB
-
MD5
b760e7dc083f0f45b6db14257826901a
-
SHA1
51ab7acd5254f2392f958e007ef6a647bab52639
-
SHA256
1c3226824b854be092d43d5100f1708ee55839a3c33b9184b39b2aee4c617279
-
SHA512
f2c862e2f82329e76eb70a386ee198f0c74f1955045dad05420f0dda0eea99841537e8a9726d9aed5640686bb87a393c869b175d03bc9b2fbf79416b2965a66c
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95H:C4Q2c94OtEvwDpj4H8zY
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-