General
-
Target
2024-06-11_682a7a05f50648c5066dc00b5f48b127_cryptolocker
-
Size
72KB
-
Sample
240611-cy78bs1bne
-
MD5
682a7a05f50648c5066dc00b5f48b127
-
SHA1
f8a796f36cb7be82e2579ade695d6574bab675b3
-
SHA256
63cebebbca7dd537bab4dffec9cc8072559cad0f81f6afb9dda56eb515fe1c8e
-
SHA512
60640b2221f631260431975a649e155e7a8dbb31bff56304a1491f3fec8292047bb9352f1d5e2de96ca9555f76f879f1374ed139cabe87c0a51e8cb4d92281a2
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Hl:C4Q2c94OtEvwDpj4H8zk
Behavioral task
behavioral1
Sample
2024-06-11_682a7a05f50648c5066dc00b5f48b127_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-11_682a7a05f50648c5066dc00b5f48b127_cryptolocker.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-11_682a7a05f50648c5066dc00b5f48b127_cryptolocker
-
Size
72KB
-
MD5
682a7a05f50648c5066dc00b5f48b127
-
SHA1
f8a796f36cb7be82e2579ade695d6574bab675b3
-
SHA256
63cebebbca7dd537bab4dffec9cc8072559cad0f81f6afb9dda56eb515fe1c8e
-
SHA512
60640b2221f631260431975a649e155e7a8dbb31bff56304a1491f3fec8292047bb9352f1d5e2de96ca9555f76f879f1374ed139cabe87c0a51e8cb4d92281a2
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Hl:C4Q2c94OtEvwDpj4H8zk
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-