General
-
Target
2024-06-10_eac309ce599ba3c9b813d3c972d12a16_cryptolocker
-
Size
41KB
-
Sample
240610-1559basfnb
-
MD5
eac309ce599ba3c9b813d3c972d12a16
-
SHA1
baf65739a1f2688e12dad91dabebdde409355525
-
SHA256
fe6bbcaec64241f1ca753d992e3d432818b7415b3b65868b8bc8181be9237f43
-
SHA512
0c2cd9028eb0a94aae2fbdedd46c5957f9a04032188b3e0c01cca763f7143f7e042fb37e13d23ae0e0b7c85f91a4781b6c3d73a86408986bd34a6d0e570bfebd
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hT:qDdFJy3QMOtEvwDpjjWMl7TG
Behavioral task
behavioral1
Sample
2024-06-10_eac309ce599ba3c9b813d3c972d12a16_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_eac309ce599ba3c9b813d3c972d12a16_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-06-10_eac309ce599ba3c9b813d3c972d12a16_cryptolocker
-
Size
41KB
-
MD5
eac309ce599ba3c9b813d3c972d12a16
-
SHA1
baf65739a1f2688e12dad91dabebdde409355525
-
SHA256
fe6bbcaec64241f1ca753d992e3d432818b7415b3b65868b8bc8181be9237f43
-
SHA512
0c2cd9028eb0a94aae2fbdedd46c5957f9a04032188b3e0c01cca763f7143f7e042fb37e13d23ae0e0b7c85f91a4781b6c3d73a86408986bd34a6d0e570bfebd
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hT:qDdFJy3QMOtEvwDpjjWMl7TG
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-