General
-
Target
2024-06-03_277d9037889e70f1085b11296e29f3b3_cryptolocker
-
Size
41KB
-
Sample
240603-yt22eagb8w
-
MD5
277d9037889e70f1085b11296e29f3b3
-
SHA1
39bfb4475fdd191eacefd2805a7f90e4f122cc9f
-
SHA256
11bb203d85e9cb4f951f51b41e472a93c0d4e4ca18451223b917b932e18f93ad
-
SHA512
9972f3a3f680d77345cf036d26511ec478f6961e7acccda268aa341ff434db823964bd86a08913473388ee0680aa5979de92ff228213064ed1055c937ebc188a
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gUH:qDdFJy3QMOtEvwDpjjWMl7TdCgUH
Behavioral task
behavioral1
Sample
2024-06-03_277d9037889e70f1085b11296e29f3b3_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_277d9037889e70f1085b11296e29f3b3_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-03_277d9037889e70f1085b11296e29f3b3_cryptolocker
-
Size
41KB
-
MD5
277d9037889e70f1085b11296e29f3b3
-
SHA1
39bfb4475fdd191eacefd2805a7f90e4f122cc9f
-
SHA256
11bb203d85e9cb4f951f51b41e472a93c0d4e4ca18451223b917b932e18f93ad
-
SHA512
9972f3a3f680d77345cf036d26511ec478f6961e7acccda268aa341ff434db823964bd86a08913473388ee0680aa5979de92ff228213064ed1055c937ebc188a
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gUH:qDdFJy3QMOtEvwDpjjWMl7TdCgUH
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-