General
-
Target
2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker
-
Size
40KB
-
Sample
240610-fks32ada83
-
MD5
dedb30b69a8bc6faed2474fc671d844f
-
SHA1
c0543575deae8cb84253a094161c59c13f974f32
-
SHA256
1a87f3db0b78596ad6749bf9a2830fb49fe8f4eb6d2891439c9362b4e2180823
-
SHA512
a89f2126aa4233408083bec98f68d524ccc0c110b8eefd21f91a122884f71c8a0a8d2a0374eec48ec24d3398340f79a2f03f7308e83a7e0975c4846fd409859b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYX5O:qDdFJy3QMOtEvwDpjjWMl7T5
Behavioral task
behavioral1
Sample
2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker
-
Size
40KB
-
MD5
dedb30b69a8bc6faed2474fc671d844f
-
SHA1
c0543575deae8cb84253a094161c59c13f974f32
-
SHA256
1a87f3db0b78596ad6749bf9a2830fb49fe8f4eb6d2891439c9362b4e2180823
-
SHA512
a89f2126aa4233408083bec98f68d524ccc0c110b8eefd21f91a122884f71c8a0a8d2a0374eec48ec24d3398340f79a2f03f7308e83a7e0975c4846fd409859b
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYX5O:qDdFJy3QMOtEvwDpjjWMl7T5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-