General
-
Target
2024-06-10_a21c08c3ea498909e478defc9461c09d_cryptolocker
-
Size
80KB
-
Sample
240610-1gkmps1eph
-
MD5
a21c08c3ea498909e478defc9461c09d
-
SHA1
e2b80962de7e62689402c5fdb18dc82e4213856d
-
SHA256
cf7267048f58fa1be4bdcd8524efb028a1d5bf8cb85a311d553544a212b7de8c
-
SHA512
1de7472874b843cdf4ffba91a1bfb34e2c7177f1a4410769774bdb7f894720ed2f7aa59fb0ddb5e14d7947cdda3f42c0a2632f8c4c37b366f489fee97c434e0f
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRhD:T6a+rdOOtEvwDpjNtQ
Behavioral task
behavioral1
Sample
2024-06-10_a21c08c3ea498909e478defc9461c09d_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-10_a21c08c3ea498909e478defc9461c09d_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-10_a21c08c3ea498909e478defc9461c09d_cryptolocker
-
Size
80KB
-
MD5
a21c08c3ea498909e478defc9461c09d
-
SHA1
e2b80962de7e62689402c5fdb18dc82e4213856d
-
SHA256
cf7267048f58fa1be4bdcd8524efb028a1d5bf8cb85a311d553544a212b7de8c
-
SHA512
1de7472874b843cdf4ffba91a1bfb34e2c7177f1a4410769774bdb7f894720ed2f7aa59fb0ddb5e14d7947cdda3f42c0a2632f8c4c37b366f489fee97c434e0f
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRhD:T6a+rdOOtEvwDpjNtQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-