General
-
Target
2024-06-10_4b3900f73e32ef05b83a3e36d5ac118c_cryptolocker
-
Size
39KB
-
Sample
240610-1c3bys1hqj
-
MD5
4b3900f73e32ef05b83a3e36d5ac118c
-
SHA1
8c67b08612db8d7831d3f212330ad48cb7f64c10
-
SHA256
acc87b66ef3f1d937b05f84d6d1cc5dbac1ca0c87b963f3a6de5c28a9c123b44
-
SHA512
a4ccdf6807ac4335453b529bb414dc36b1adbb5405c698936fe4b6f8f1a95c1fd9d831cb7544897342e6ec48c2b84d03064d43fa223575bd4e9e69c78552a499
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/Nt:qDdFJy3QMOtEvwDpjjWMl7Tdn/3
Behavioral task
behavioral1
Sample
2024-06-10_4b3900f73e32ef05b83a3e36d5ac118c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-10_4b3900f73e32ef05b83a3e36d5ac118c_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_4b3900f73e32ef05b83a3e36d5ac118c_cryptolocker
-
Size
39KB
-
MD5
4b3900f73e32ef05b83a3e36d5ac118c
-
SHA1
8c67b08612db8d7831d3f212330ad48cb7f64c10
-
SHA256
acc87b66ef3f1d937b05f84d6d1cc5dbac1ca0c87b963f3a6de5c28a9c123b44
-
SHA512
a4ccdf6807ac4335453b529bb414dc36b1adbb5405c698936fe4b6f8f1a95c1fd9d831cb7544897342e6ec48c2b84d03064d43fa223575bd4e9e69c78552a499
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/Nt:qDdFJy3QMOtEvwDpjjWMl7Tdn/3
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-