General
-
Target
2024-06-11_fb270cf54c97f398be42864f5537e8cc_cryptolocker
-
Size
70KB
-
Sample
240611-b4sjdszelr
-
MD5
fb270cf54c97f398be42864f5537e8cc
-
SHA1
3e15cbefe1ac2198217afdb8b0c5d749f347d8c5
-
SHA256
dfd1e50523f56d1b6ba6b53989e3294f7fd439f3825ace137fdffeb83fb1e245
-
SHA512
ca9a919c880b5d9ce46ada4ecb4a35225a656f2801226a2749be36a16a2008314950c416b8fbd9260a0a06b3bf77e977d0eb2f7ff03464b09de75580d644f526
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1Pb:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAb
Behavioral task
behavioral1
Sample
2024-06-11_fb270cf54c97f398be42864f5537e8cc_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-11_fb270cf54c97f398be42864f5537e8cc_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_fb270cf54c97f398be42864f5537e8cc_cryptolocker
-
Size
70KB
-
MD5
fb270cf54c97f398be42864f5537e8cc
-
SHA1
3e15cbefe1ac2198217afdb8b0c5d749f347d8c5
-
SHA256
dfd1e50523f56d1b6ba6b53989e3294f7fd439f3825ace137fdffeb83fb1e245
-
SHA512
ca9a919c880b5d9ce46ada4ecb4a35225a656f2801226a2749be36a16a2008314950c416b8fbd9260a0a06b3bf77e977d0eb2f7ff03464b09de75580d644f526
-
SSDEEP
768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1Pb:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-