General
-
Target
2024-06-04_e2449e8102c8957b8b713286402c3d31_cryptolocker
-
Size
40KB
-
Sample
240604-zetbdsaf7t
-
MD5
e2449e8102c8957b8b713286402c3d31
-
SHA1
ab588c11d427e1d99d247e09430d8d14436f86a7
-
SHA256
0b9512f018a6b96b87200edd76bc83f83c3c9745e5d70729133df3430b1ef794
-
SHA512
d2b63ff91f6cde486a16a24e3fac3d5e1ceea130902974e4a2c9c60f63d63250509dfe6a74c69424e0b21b97ac529943980a36ddaf335bd6040b1b6428c99a54
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYx:qDdFJy3QMOtEvwDpjjWMl7T8
Behavioral task
behavioral1
Sample
2024-06-04_e2449e8102c8957b8b713286402c3d31_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-04_e2449e8102c8957b8b713286402c3d31_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-04_e2449e8102c8957b8b713286402c3d31_cryptolocker
-
Size
40KB
-
MD5
e2449e8102c8957b8b713286402c3d31
-
SHA1
ab588c11d427e1d99d247e09430d8d14436f86a7
-
SHA256
0b9512f018a6b96b87200edd76bc83f83c3c9745e5d70729133df3430b1ef794
-
SHA512
d2b63ff91f6cde486a16a24e3fac3d5e1ceea130902974e4a2c9c60f63d63250509dfe6a74c69424e0b21b97ac529943980a36ddaf335bd6040b1b6428c99a54
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYx:qDdFJy3QMOtEvwDpjjWMl7T8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-