General
-
Target
2024-06-06_723eac445e0324f62b8fc40038086272_cryptolocker
-
Size
63KB
-
Sample
240606-3gsz7aef77
-
MD5
723eac445e0324f62b8fc40038086272
-
SHA1
7d2efb3106a5371cb8521347ace1519febe573ce
-
SHA256
7bfb1a0e17e2437f4f66bd68abe6fc1ea750276a1a5feccb24cc2b3e2c0c04e6
-
SHA512
eafb9a4e1af7f8eed04f189389916acad597efc3157239982d2b655f8599905669079679563687368b109dd3072dbba19402d68d22672e15359fe9ddacd43a69
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zS:0j+soPSMOtEvwDpjwizbR9XwzS
Behavioral task
behavioral1
Sample
2024-06-06_723eac445e0324f62b8fc40038086272_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-06_723eac445e0324f62b8fc40038086272_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-06-06_723eac445e0324f62b8fc40038086272_cryptolocker
-
Size
63KB
-
MD5
723eac445e0324f62b8fc40038086272
-
SHA1
7d2efb3106a5371cb8521347ace1519febe573ce
-
SHA256
7bfb1a0e17e2437f4f66bd68abe6fc1ea750276a1a5feccb24cc2b3e2c0c04e6
-
SHA512
eafb9a4e1af7f8eed04f189389916acad597efc3157239982d2b655f8599905669079679563687368b109dd3072dbba19402d68d22672e15359fe9ddacd43a69
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zS:0j+soPSMOtEvwDpjwizbR9XwzS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-