General
-
Target
2024-06-10_56d69e9d682042d8d653a3fd073879ab_cryptolocker
-
Size
41KB
-
Sample
240610-1dqpjs1dnf
-
MD5
56d69e9d682042d8d653a3fd073879ab
-
SHA1
03f5f04983d00cb670eda036a9d991fb361a08e7
-
SHA256
ffc53ebd0ffbc8b0e1ab33595dffce7163443731fa4d8be8f75b8fac05926969
-
SHA512
77e12d4a4ddc1519c281f8c676708293f54b6232f3ef0eecf1e7d757025461260b2081ccb3548c17dab581484052d2f30e6bac5740703b688d9527c57332d9c9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYlj4:qDdFJy3QMOtEvwDpjjWMl7T6s
Behavioral task
behavioral1
Sample
2024-06-10_56d69e9d682042d8d653a3fd073879ab_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_56d69e9d682042d8d653a3fd073879ab_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_56d69e9d682042d8d653a3fd073879ab_cryptolocker
-
Size
41KB
-
MD5
56d69e9d682042d8d653a3fd073879ab
-
SHA1
03f5f04983d00cb670eda036a9d991fb361a08e7
-
SHA256
ffc53ebd0ffbc8b0e1ab33595dffce7163443731fa4d8be8f75b8fac05926969
-
SHA512
77e12d4a4ddc1519c281f8c676708293f54b6232f3ef0eecf1e7d757025461260b2081ccb3548c17dab581484052d2f30e6bac5740703b688d9527c57332d9c9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYlj4:qDdFJy3QMOtEvwDpjjWMl7T6s
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-