General
-
Target
2024-06-12_75d7f47a510988af83b40be103122059_cryptolocker
-
Size
41KB
-
Sample
240612-sf5bqatbkp
-
MD5
75d7f47a510988af83b40be103122059
-
SHA1
190db440b4b6291967789bee817eab8bf81e19ed
-
SHA256
b900af36c0e8bffd578cb37fb46fe00ea3763f41bbe99eb1019853f88886fb79
-
SHA512
e16f0f9d42fd56a3f4bd893289ab689f414b383b6cc866ac03b0b53fb513c7063ef91b3b60e7bfbe6378deddc0b7b522666e46cb4e3253ecd03177df17924e8d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYX5I:qDdFJy3QMOtEvwDpjjWMl7Tz
Behavioral task
behavioral1
Sample
2024-06-12_75d7f47a510988af83b40be103122059_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_75d7f47a510988af83b40be103122059_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-12_75d7f47a510988af83b40be103122059_cryptolocker
-
Size
41KB
-
MD5
75d7f47a510988af83b40be103122059
-
SHA1
190db440b4b6291967789bee817eab8bf81e19ed
-
SHA256
b900af36c0e8bffd578cb37fb46fe00ea3763f41bbe99eb1019853f88886fb79
-
SHA512
e16f0f9d42fd56a3f4bd893289ab689f414b383b6cc866ac03b0b53fb513c7063ef91b3b60e7bfbe6378deddc0b7b522666e46cb4e3253ecd03177df17924e8d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYX5I:qDdFJy3QMOtEvwDpjjWMl7Tz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-