General
-
Target
2024-06-10_49336bbb2b76cf89a5525f72b15d6df4_cryptolocker
-
Size
54KB
-
Sample
240610-fczkvach59
-
MD5
49336bbb2b76cf89a5525f72b15d6df4
-
SHA1
03463001c405c16a33368d891242e73941c6d600
-
SHA256
57c9ed2d63ab6c90fd96ba0ac4ad9c8ce3878d7dd50c1fbee7f3b1efdce78baa
-
SHA512
12a43c094b0ce4f6d3559f030931c3bfdf36076b5110b852bd8e33f74c43ffa88dc82e065197068c3035942972ac2d7a475e9cb3efe2dabd23642a32e37c759b
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgC:z6QFElP6n+gKmddpMOtEvwDpj31ikgC
Behavioral task
behavioral1
Sample
2024-06-10_49336bbb2b76cf89a5525f72b15d6df4_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-10_49336bbb2b76cf89a5525f72b15d6df4_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-06-10_49336bbb2b76cf89a5525f72b15d6df4_cryptolocker
-
Size
54KB
-
MD5
49336bbb2b76cf89a5525f72b15d6df4
-
SHA1
03463001c405c16a33368d891242e73941c6d600
-
SHA256
57c9ed2d63ab6c90fd96ba0ac4ad9c8ce3878d7dd50c1fbee7f3b1efdce78baa
-
SHA512
12a43c094b0ce4f6d3559f030931c3bfdf36076b5110b852bd8e33f74c43ffa88dc82e065197068c3035942972ac2d7a475e9cb3efe2dabd23642a32e37c759b
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgC:z6QFElP6n+gKmddpMOtEvwDpj31ikgC
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-