General
-
Target
2024-06-10_a8733c79dcac9e8d243c777fdf2acc41_cryptolocker
-
Size
69KB
-
Sample
240610-gvlx5sda2z
-
MD5
a8733c79dcac9e8d243c777fdf2acc41
-
SHA1
7b430e5e5bebeea04394392b0fa8efec36104dc3
-
SHA256
eeb55d47a738adc33424fa5f9cb2ad9d4910d6ae0dcae23caba99d49dd3f5cd8
-
SHA512
ee0a3719c147ac96d65a14febad24457ca2e777186b73cbd6f59a86e781f71365ea3d421451f266b69dca4d85e10aac0d36cd51cd132b5baf3ff69734ace7500
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQApI0F:78SEOtEvwDpjWYvQd2P1
Behavioral task
behavioral1
Sample
2024-06-10_a8733c79dcac9e8d243c777fdf2acc41_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-10_a8733c79dcac9e8d243c777fdf2acc41_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_a8733c79dcac9e8d243c777fdf2acc41_cryptolocker
-
Size
69KB
-
MD5
a8733c79dcac9e8d243c777fdf2acc41
-
SHA1
7b430e5e5bebeea04394392b0fa8efec36104dc3
-
SHA256
eeb55d47a738adc33424fa5f9cb2ad9d4910d6ae0dcae23caba99d49dd3f5cd8
-
SHA512
ee0a3719c147ac96d65a14febad24457ca2e777186b73cbd6f59a86e781f71365ea3d421451f266b69dca4d85e10aac0d36cd51cd132b5baf3ff69734ace7500
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQApI0F:78SEOtEvwDpjWYvQd2P1
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-