General
-
Target
2024-06-11_a16e6ad99f81f5aa87ce0a438160f661_cryptolocker
-
Size
41KB
-
Sample
240611-bke4ysyepm
-
MD5
a16e6ad99f81f5aa87ce0a438160f661
-
SHA1
1dc01d9b0a8f47986b40c9c9dc9c866d62b50a37
-
SHA256
c8a5d40b1a9548080cb7b746f234ccb4bc0d2407b50705d0437794bcf4d37d0d
-
SHA512
48c6a80f75c35d6d68cd401148e32fd966bca92d747c096a4629ea4f25ff01f5be317c3f684fbb63df4cb3a13eefdd71f4f7ce0d15cae3b71e3db381ecefa708
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYZ:qDdFJy3QMOtEvwDpjjWMl7Tc
Behavioral task
behavioral1
Sample
2024-06-11_a16e6ad99f81f5aa87ce0a438160f661_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-11_a16e6ad99f81f5aa87ce0a438160f661_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_a16e6ad99f81f5aa87ce0a438160f661_cryptolocker
-
Size
41KB
-
MD5
a16e6ad99f81f5aa87ce0a438160f661
-
SHA1
1dc01d9b0a8f47986b40c9c9dc9c866d62b50a37
-
SHA256
c8a5d40b1a9548080cb7b746f234ccb4bc0d2407b50705d0437794bcf4d37d0d
-
SHA512
48c6a80f75c35d6d68cd401148e32fd966bca92d747c096a4629ea4f25ff01f5be317c3f684fbb63df4cb3a13eefdd71f4f7ce0d15cae3b71e3db381ecefa708
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYZ:qDdFJy3QMOtEvwDpjjWMl7Tc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-