General
-
Target
2024-06-11_bbb707cda5d93d596ae50e1c1ba4f47d_cryptolocker
-
Size
40KB
-
Sample
240611-bn9sqsycjf
-
MD5
bbb707cda5d93d596ae50e1c1ba4f47d
-
SHA1
9b785147a00c0d57f1bdf2aedd796f6aaf936287
-
SHA256
c67dea1afa7f3d432a629c774762881ec1d83d118446ce5fc623102e93e93ea8
-
SHA512
a138c11f99652a6a05a60789c717eb3f67a96c4f1ad428e1da1fbfe91d01332b56897b51c8aaee31dc9937839d07ba2d871a2885118b8c7b84a498f83911b9ff
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan8t:qDdFJy3QMOtEvwDpjjWMl7Tdn8t
Behavioral task
behavioral1
Sample
2024-06-11_bbb707cda5d93d596ae50e1c1ba4f47d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_bbb707cda5d93d596ae50e1c1ba4f47d_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_bbb707cda5d93d596ae50e1c1ba4f47d_cryptolocker
-
Size
40KB
-
MD5
bbb707cda5d93d596ae50e1c1ba4f47d
-
SHA1
9b785147a00c0d57f1bdf2aedd796f6aaf936287
-
SHA256
c67dea1afa7f3d432a629c774762881ec1d83d118446ce5fc623102e93e93ea8
-
SHA512
a138c11f99652a6a05a60789c717eb3f67a96c4f1ad428e1da1fbfe91d01332b56897b51c8aaee31dc9937839d07ba2d871a2885118b8c7b84a498f83911b9ff
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan8t:qDdFJy3QMOtEvwDpjjWMl7Tdn8t
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-