General
-
Target
2024-06-05_738368ab6ea77682e2a5874a9ca20c12_cryptolocker
-
Size
40KB
-
Sample
240605-jcw2hahf7w
-
MD5
738368ab6ea77682e2a5874a9ca20c12
-
SHA1
f933cede1b31ff23b9daf4ab7ef1df240b88fa56
-
SHA256
cf9d2f22e104b8fd5c07c5176a032caae251a52da89bc2013de5e8460bb1330a
-
SHA512
2661dd23cf54e5df16e84c2236e3ec9b4cfac96b45f6610d3c5654cfae3f4369e6123ab75d2024bf03c772d580d4153b85174565e2f35ff6b66c529abe8e1bd1
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYa:qDdFJy3QMOtEvwDpjjWMl7TT
Behavioral task
behavioral1
Sample
2024-06-05_738368ab6ea77682e2a5874a9ca20c12_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-05_738368ab6ea77682e2a5874a9ca20c12_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-05_738368ab6ea77682e2a5874a9ca20c12_cryptolocker
-
Size
40KB
-
MD5
738368ab6ea77682e2a5874a9ca20c12
-
SHA1
f933cede1b31ff23b9daf4ab7ef1df240b88fa56
-
SHA256
cf9d2f22e104b8fd5c07c5176a032caae251a52da89bc2013de5e8460bb1330a
-
SHA512
2661dd23cf54e5df16e84c2236e3ec9b4cfac96b45f6610d3c5654cfae3f4369e6123ab75d2024bf03c772d580d4153b85174565e2f35ff6b66c529abe8e1bd1
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYa:qDdFJy3QMOtEvwDpjjWMl7TT
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-