General
-
Target
2024-06-11_c9d8d1796906210f24615cdb61431dad_cryptolocker
-
Size
41KB
-
Sample
240611-a2562axcka
-
MD5
c9d8d1796906210f24615cdb61431dad
-
SHA1
bb09c3e768caa0d3e4ee574e0e07fcf7f57b6419
-
SHA256
16990c0ef329bae4ce15d460b86e7f4858c7f4ec022ae272e08b29dd5139cdf3
-
SHA512
0e28080443bf75b3405967a59887c70c8bf2b450bb815e46b0f8bf8525f3c36fd17d4c9ac239518aec204f06108f9102c796f28a9b7e39ea3cb1315d51ff9440
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/0G:qDdFJy3QMOtEvwDpjjWMl7TC
Behavioral task
behavioral1
Sample
2024-06-11_c9d8d1796906210f24615cdb61431dad_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-11_c9d8d1796906210f24615cdb61431dad_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-11_c9d8d1796906210f24615cdb61431dad_cryptolocker
-
Size
41KB
-
MD5
c9d8d1796906210f24615cdb61431dad
-
SHA1
bb09c3e768caa0d3e4ee574e0e07fcf7f57b6419
-
SHA256
16990c0ef329bae4ce15d460b86e7f4858c7f4ec022ae272e08b29dd5139cdf3
-
SHA512
0e28080443bf75b3405967a59887c70c8bf2b450bb815e46b0f8bf8525f3c36fd17d4c9ac239518aec204f06108f9102c796f28a9b7e39ea3cb1315d51ff9440
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/0G:qDdFJy3QMOtEvwDpjjWMl7TC
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-