General
-
Target
2024-06-09_7220786c39dfd9eb9005e11d2dbd68fa_cryptolocker
-
Size
78KB
-
Sample
240609-jaygjsgc92
-
MD5
7220786c39dfd9eb9005e11d2dbd68fa
-
SHA1
55bc5ebdb659e58b308043905ff7e55fc70527f1
-
SHA256
9bd57e9bfb23884ff1cb95f5a91890fa163fae40c9f7adf14799a49c6773c047
-
SHA512
1455e5e809340f9225537a7688b7135e74625d8bde8eba47c802146381fedb98ba1be24e8e871ad80934a7d540d44ca262e6845cb0297e21718484289952af4a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1o:T6a+rdOOtEvwDpjNtHPL
Behavioral task
behavioral1
Sample
2024-06-09_7220786c39dfd9eb9005e11d2dbd68fa_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-09_7220786c39dfd9eb9005e11d2dbd68fa_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-09_7220786c39dfd9eb9005e11d2dbd68fa_cryptolocker
-
Size
78KB
-
MD5
7220786c39dfd9eb9005e11d2dbd68fa
-
SHA1
55bc5ebdb659e58b308043905ff7e55fc70527f1
-
SHA256
9bd57e9bfb23884ff1cb95f5a91890fa163fae40c9f7adf14799a49c6773c047
-
SHA512
1455e5e809340f9225537a7688b7135e74625d8bde8eba47c802146381fedb98ba1be24e8e871ad80934a7d540d44ca262e6845cb0297e21718484289952af4a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1o:T6a+rdOOtEvwDpjNtHPL
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-