General
-
Target
2024-06-11_50fee36ccbc9a9ef4614035256602050_cryptolocker
-
Size
52KB
-
Sample
240611-g68ahsyakk
-
MD5
50fee36ccbc9a9ef4614035256602050
-
SHA1
ce64ff85c1e350ee28fef53a0ec80c197bc8e9f8
-
SHA256
f9d777135947b48bc5b5e4a91a08d351a35c3f746234c5c55e64b02e0fefaa23
-
SHA512
f46c2ceaa79d279f0f8370f7a2065ebb135785a0ad75901e37e33588d3a7a07cf854bc6042358552f23e10b99bc93a96b1d2a92167fe26854b8ec3b2f1962a7d
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO7:bODOw9acifAoc+v4
Behavioral task
behavioral1
Sample
2024-06-11_50fee36ccbc9a9ef4614035256602050_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_50fee36ccbc9a9ef4614035256602050_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-11_50fee36ccbc9a9ef4614035256602050_cryptolocker
-
Size
52KB
-
MD5
50fee36ccbc9a9ef4614035256602050
-
SHA1
ce64ff85c1e350ee28fef53a0ec80c197bc8e9f8
-
SHA256
f9d777135947b48bc5b5e4a91a08d351a35c3f746234c5c55e64b02e0fefaa23
-
SHA512
f46c2ceaa79d279f0f8370f7a2065ebb135785a0ad75901e37e33588d3a7a07cf854bc6042358552f23e10b99bc93a96b1d2a92167fe26854b8ec3b2f1962a7d
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO7:bODOw9acifAoc+v4
Score9/10-
Detection of CryptoLocker Variants
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-