General
-
Target
2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker
-
Size
81KB
-
Sample
240610-z95b5s1gkk
-
MD5
1c6e1682568d4162f2b47211d17a788b
-
SHA1
2bdab7e17eef3bd5ec0c3e99a0dbd3d665a5d1b0
-
SHA256
c27a9215702b6ed2f2a6908e8a3f0b207a1cd9920b0b2000cc937efe0e6aee50
-
SHA512
590ed1d26925d19db50bafbf284209749bf3c62c7231876c7acc812762a1a2131c8b86cb912b64d7354c75f8fe1db00c0ed2ff1ab5ba7a7e9a1fdd709e814dbe
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qq:zCsanOtEvwDpjm
Behavioral task
behavioral1
Sample
2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-10_1c6e1682568d4162f2b47211d17a788b_cryptolocker
-
Size
81KB
-
MD5
1c6e1682568d4162f2b47211d17a788b
-
SHA1
2bdab7e17eef3bd5ec0c3e99a0dbd3d665a5d1b0
-
SHA256
c27a9215702b6ed2f2a6908e8a3f0b207a1cd9920b0b2000cc937efe0e6aee50
-
SHA512
590ed1d26925d19db50bafbf284209749bf3c62c7231876c7acc812762a1a2131c8b86cb912b64d7354c75f8fe1db00c0ed2ff1ab5ba7a7e9a1fdd709e814dbe
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qq:zCsanOtEvwDpjm
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-