General
-
Target
2024-06-06_73913ebeaffd91774ce5b1b6dc1809ee_cryptolocker
-
Size
62KB
-
Sample
240606-1btnesdd38
-
MD5
73913ebeaffd91774ce5b1b6dc1809ee
-
SHA1
77cc13d1df8cf76b715f3c75db5ae291ccec216a
-
SHA256
d24ee452e92f7b802512e530f48145d2dfd18aab452d44937d2ac92921a572d9
-
SHA512
aeeed0afcd8836129a3e491863f5363decd534cdd26a463d20dd364b7230c9bb191cd3abaed6a9f4858943b56abc665897677b67fc89fcc48728341a9ffee63b
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zh:0j+soPSMOtEvwDpjwizbR9Xwzh
Behavioral task
behavioral1
Sample
2024-06-06_73913ebeaffd91774ce5b1b6dc1809ee_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-06_73913ebeaffd91774ce5b1b6dc1809ee_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-06_73913ebeaffd91774ce5b1b6dc1809ee_cryptolocker
-
Size
62KB
-
MD5
73913ebeaffd91774ce5b1b6dc1809ee
-
SHA1
77cc13d1df8cf76b715f3c75db5ae291ccec216a
-
SHA256
d24ee452e92f7b802512e530f48145d2dfd18aab452d44937d2ac92921a572d9
-
SHA512
aeeed0afcd8836129a3e491863f5363decd534cdd26a463d20dd364b7230c9bb191cd3abaed6a9f4858943b56abc665897677b67fc89fcc48728341a9ffee63b
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zh:0j+soPSMOtEvwDpjwizbR9Xwzh
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-