General
-
Target
2024-06-03_ffcf432f33946b9297a3e94e1424c8fc_cryptolocker
-
Size
37KB
-
Sample
240603-fbk13abg6w
-
MD5
ffcf432f33946b9297a3e94e1424c8fc
-
SHA1
e68d8aa25010210c113db063ad9f7eea6eec163b
-
SHA256
1b26dd483b167dbdb9df60c6b24b1203adab1b9b7f177b3ccbb05428f87f2586
-
SHA512
e11a4e440cdbd8c503257b31b5376ff8b3f477f14e75e976ad2a0990c5de7e71eaee3feb7399b9872f698102eb924b055edf46e6a12257e5157364597218cfa0
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3VKLM:qUmnpomddpMOtEvwDpjjaYaQQM
Behavioral task
behavioral1
Sample
2024-06-03_ffcf432f33946b9297a3e94e1424c8fc_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-03_ffcf432f33946b9297a3e94e1424c8fc_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-03_ffcf432f33946b9297a3e94e1424c8fc_cryptolocker
-
Size
37KB
-
MD5
ffcf432f33946b9297a3e94e1424c8fc
-
SHA1
e68d8aa25010210c113db063ad9f7eea6eec163b
-
SHA256
1b26dd483b167dbdb9df60c6b24b1203adab1b9b7f177b3ccbb05428f87f2586
-
SHA512
e11a4e440cdbd8c503257b31b5376ff8b3f477f14e75e976ad2a0990c5de7e71eaee3feb7399b9872f698102eb924b055edf46e6a12257e5157364597218cfa0
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3VKLM:qUmnpomddpMOtEvwDpjjaYaQQM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-