General
-
Target
2024-06-11_451d71ba52aac5783440df37341df635_cryptolocker
-
Size
74KB
-
Sample
240611-atmdyswhle
-
MD5
451d71ba52aac5783440df37341df635
-
SHA1
0b772e3dc7baf6d7f5b0cd1e2f8f211c91ea9afe
-
SHA256
387437e673a4186f27a98264d8e6a33d3371567402e8f60689b5bc2a463a0284
-
SHA512
c05c13c0f6baa8e3daf20878d7abd7fd09106ff3203154322b23e000ca93f2c26d903ab456ecc5920f9bb7ba25991bd582a0581bc383ce5b9a45bfc3c2b579b5
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs98R:C4Q2c94OtEvwDpj4H8zD
Behavioral task
behavioral1
Sample
2024-06-11_451d71ba52aac5783440df37341df635_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-11_451d71ba52aac5783440df37341df635_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_451d71ba52aac5783440df37341df635_cryptolocker
-
Size
74KB
-
MD5
451d71ba52aac5783440df37341df635
-
SHA1
0b772e3dc7baf6d7f5b0cd1e2f8f211c91ea9afe
-
SHA256
387437e673a4186f27a98264d8e6a33d3371567402e8f60689b5bc2a463a0284
-
SHA512
c05c13c0f6baa8e3daf20878d7abd7fd09106ff3203154322b23e000ca93f2c26d903ab456ecc5920f9bb7ba25991bd582a0581bc383ce5b9a45bfc3c2b579b5
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs98R:C4Q2c94OtEvwDpj4H8zD
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-