General
-
Target
2024-06-10_98768e8703a5b946d5548b8321c988fa_cryptolocker
-
Size
41KB
-
Sample
240610-1fzp8s1enb
-
MD5
98768e8703a5b946d5548b8321c988fa
-
SHA1
ccd62b6ed2800c10dcb7eccf02e211bbdf8e0552
-
SHA256
451a4d4b2fa6f735b20ae8c90402b6b75446480756204509bb8e9d2456de3ae3
-
SHA512
2264fcd842e70c413a55a0cc8e4b28d82f9202828757e34aad223762d019ee869032d526a91d9dbff5f6d4bd4b980984faab121686a1f15cd93f174f50d8bdab
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYljy:qDdFJy3QMOtEvwDpjjWMl7T6+
Behavioral task
behavioral1
Sample
2024-06-10_98768e8703a5b946d5548b8321c988fa_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-10_98768e8703a5b946d5548b8321c988fa_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-10_98768e8703a5b946d5548b8321c988fa_cryptolocker
-
Size
41KB
-
MD5
98768e8703a5b946d5548b8321c988fa
-
SHA1
ccd62b6ed2800c10dcb7eccf02e211bbdf8e0552
-
SHA256
451a4d4b2fa6f735b20ae8c90402b6b75446480756204509bb8e9d2456de3ae3
-
SHA512
2264fcd842e70c413a55a0cc8e4b28d82f9202828757e34aad223762d019ee869032d526a91d9dbff5f6d4bd4b980984faab121686a1f15cd93f174f50d8bdab
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYljy:qDdFJy3QMOtEvwDpjjWMl7T6+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-