General
-
Target
2024-06-11_cd41dad994ae88ad27fe9d660eea357f_cryptolocker
-
Size
53KB
-
Sample
240611-bl4hyayfmp
-
MD5
cd41dad994ae88ad27fe9d660eea357f
-
SHA1
76fa2dfe5c015f1aefeb0bf66280d09e5c79116b
-
SHA256
f8ee28eaf6a1172c9d7ce6bab74af535f67cbea04df9e99807acebe94b54fee4
-
SHA512
8ae1a167adac502754a5377e3320a07127df9f04a0e7d37eb2191753a2634db212715b3e80d5516bb3306d8f19049cf0b2a4b0428b535cc8a31a925a3500341c
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXy:bODOw9acifAoc+vt
Behavioral task
behavioral1
Sample
2024-06-11_cd41dad994ae88ad27fe9d660eea357f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_cd41dad994ae88ad27fe9d660eea357f_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-11_cd41dad994ae88ad27fe9d660eea357f_cryptolocker
-
Size
53KB
-
MD5
cd41dad994ae88ad27fe9d660eea357f
-
SHA1
76fa2dfe5c015f1aefeb0bf66280d09e5c79116b
-
SHA256
f8ee28eaf6a1172c9d7ce6bab74af535f67cbea04df9e99807acebe94b54fee4
-
SHA512
8ae1a167adac502754a5377e3320a07127df9f04a0e7d37eb2191753a2634db212715b3e80d5516bb3306d8f19049cf0b2a4b0428b535cc8a31a925a3500341c
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXy:bODOw9acifAoc+vt
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-