General
-
Target
2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker
-
Size
90KB
-
Sample
240611-a4djssxcpb
-
MD5
da4656bfd308452e10b69aa0d0b7d592
-
SHA1
abb201c2e68e899f6ec0749a98002cd1571999c6
-
SHA256
78a039e43ec0eba0d383b88ff6c1a4b1381f9a51e28a02ba5e95085f0fa603f7
-
SHA512
9c7b17f8ed6f5f4f422021d3d2b4169b4a90e9a949a31c5b71a0b7ca18b14979136119ad630384d5635b2030645c3c1562afff9c9f497f8a4c8901e89700ef3f
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblF:zCsanOtEvwDpjO
Behavioral task
behavioral1
Sample
2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-11_da4656bfd308452e10b69aa0d0b7d592_cryptolocker
-
Size
90KB
-
MD5
da4656bfd308452e10b69aa0d0b7d592
-
SHA1
abb201c2e68e899f6ec0749a98002cd1571999c6
-
SHA256
78a039e43ec0eba0d383b88ff6c1a4b1381f9a51e28a02ba5e95085f0fa603f7
-
SHA512
9c7b17f8ed6f5f4f422021d3d2b4169b4a90e9a949a31c5b71a0b7ca18b14979136119ad630384d5635b2030645c3c1562afff9c9f497f8a4c8901e89700ef3f
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tyblF:zCsanOtEvwDpjO
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-