General
-
Target
2024-06-02_8c1c01d100767d1c40de3da15ef52583_cryptolocker
-
Size
70KB
-
Sample
240602-q2542aeg57
-
MD5
8c1c01d100767d1c40de3da15ef52583
-
SHA1
ce383cd210b89d48deb289c564d8abe402fa9aa7
-
SHA256
26a86a07708c9ec76763b9915aeab2c1ded99703a5924dfdc29add3dccb97843
-
SHA512
34d155d72c363b07a9451483178910fc3180c2716608e4ead6cdfca74e8c772e7917f3cba96ab36715e7da056c5c372cbdf9a1bcde920c5afbdf8f1950d2d174
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAeY:78SEOtEvwDpjWYvQd2PF
Behavioral task
behavioral1
Sample
2024-06-02_8c1c01d100767d1c40de3da15ef52583_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-02_8c1c01d100767d1c40de3da15ef52583_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-02_8c1c01d100767d1c40de3da15ef52583_cryptolocker
-
Size
70KB
-
MD5
8c1c01d100767d1c40de3da15ef52583
-
SHA1
ce383cd210b89d48deb289c564d8abe402fa9aa7
-
SHA256
26a86a07708c9ec76763b9915aeab2c1ded99703a5924dfdc29add3dccb97843
-
SHA512
34d155d72c363b07a9451483178910fc3180c2716608e4ead6cdfca74e8c772e7917f3cba96ab36715e7da056c5c372cbdf9a1bcde920c5afbdf8f1950d2d174
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAeY:78SEOtEvwDpjWYvQd2PF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-