General
-
Target
2024-06-10_f934fae6bfbb6268566f86cd9b38e5ec_cryptolocker
-
Size
95KB
-
Sample
240610-1l3dbasdkp
-
MD5
f934fae6bfbb6268566f86cd9b38e5ec
-
SHA1
b8b2f58ffdd8d5b7540da4c0b9c758510a2e38de
-
SHA256
2c571c3a1e8a8d5e005c8f2e58124ecb37aa4e10449898c5a4e44a84088476eb
-
SHA512
272bfd95a4ae65a05f69ee62bb2855e2366fb4aada134be003a5711fcbd0859c162a216b613af9b7ef23619ba53e7c1ee2ea72e9ed841c058f2e824468212b61
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/ks:zCsanOtEvwDpjB3
Behavioral task
behavioral1
Sample
2024-06-10_f934fae6bfbb6268566f86cd9b38e5ec_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_f934fae6bfbb6268566f86cd9b38e5ec_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_f934fae6bfbb6268566f86cd9b38e5ec_cryptolocker
-
Size
95KB
-
MD5
f934fae6bfbb6268566f86cd9b38e5ec
-
SHA1
b8b2f58ffdd8d5b7540da4c0b9c758510a2e38de
-
SHA256
2c571c3a1e8a8d5e005c8f2e58124ecb37aa4e10449898c5a4e44a84088476eb
-
SHA512
272bfd95a4ae65a05f69ee62bb2855e2366fb4aada134be003a5711fcbd0859c162a216b613af9b7ef23619ba53e7c1ee2ea72e9ed841c058f2e824468212b61
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/ks:zCsanOtEvwDpjB3
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-