General
-
Target
2024-06-11_f8b67352607a3bf610980b04a181a868_cryptolocker
-
Size
60KB
-
Sample
240611-b4j71syhne
-
MD5
f8b67352607a3bf610980b04a181a868
-
SHA1
0dc7ed074dd44960bd7aeeffd691a73818a6bc35
-
SHA256
9bc8641eb816a2b2d3a80117953aa85a9637da7857fcfe6e9a52b766f0d9ccce
-
SHA512
53e24686db561a23ec1dc4ae6dfbf2d3f878d6396800206ff23d663e0bb23204c4ed9eb408c0ea93625bc98fa52c1b83ce371f36c3cfcdbb5bbe25a859a77595
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjZ:H6QFElP6n+gou9cvMOtEvwDpjCpVX8
Behavioral task
behavioral1
Sample
2024-06-11_f8b67352607a3bf610980b04a181a868_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-11_f8b67352607a3bf610980b04a181a868_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_f8b67352607a3bf610980b04a181a868_cryptolocker
-
Size
60KB
-
MD5
f8b67352607a3bf610980b04a181a868
-
SHA1
0dc7ed074dd44960bd7aeeffd691a73818a6bc35
-
SHA256
9bc8641eb816a2b2d3a80117953aa85a9637da7857fcfe6e9a52b766f0d9ccce
-
SHA512
53e24686db561a23ec1dc4ae6dfbf2d3f878d6396800206ff23d663e0bb23204c4ed9eb408c0ea93625bc98fa52c1b83ce371f36c3cfcdbb5bbe25a859a77595
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjZ:H6QFElP6n+gou9cvMOtEvwDpjCpVX8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-