General
-
Target
2024-06-05_7b30301c4408e03bc302d7cdd851f7ad_cryptolocker
-
Size
60KB
-
Sample
240605-d8ppeaea69
-
MD5
7b30301c4408e03bc302d7cdd851f7ad
-
SHA1
7ac6354deb01cb3fd5d87230fa1d0af41ea24bea
-
SHA256
fa7fceddeddc47eab51969cf89f1baff77d641290c79923cda1d57e7957b5c1b
-
SHA512
9eff936b54c736fc2313097c8ef3b47929d59d4ef2c68ed49257077ecbc79468694be709cf2be67a52a70fe5c071b08316f8808e707c2f53b802dfb7fee40798
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPj4:H6QFElP6n+gou9cvMOtEvwDpjCpVXt
Behavioral task
behavioral1
Sample
2024-06-05_7b30301c4408e03bc302d7cdd851f7ad_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-05_7b30301c4408e03bc302d7cdd851f7ad_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-05_7b30301c4408e03bc302d7cdd851f7ad_cryptolocker
-
Size
60KB
-
MD5
7b30301c4408e03bc302d7cdd851f7ad
-
SHA1
7ac6354deb01cb3fd5d87230fa1d0af41ea24bea
-
SHA256
fa7fceddeddc47eab51969cf89f1baff77d641290c79923cda1d57e7957b5c1b
-
SHA512
9eff936b54c736fc2313097c8ef3b47929d59d4ef2c68ed49257077ecbc79468694be709cf2be67a52a70fe5c071b08316f8808e707c2f53b802dfb7fee40798
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPj4:H6QFElP6n+gou9cvMOtEvwDpjCpVXt
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-