General
-
Target
2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker
-
Size
40KB
-
Sample
240612-xd3sbszapr
-
MD5
370869683aad44f22e0c1ee5ea67f94d
-
SHA1
8bb868f0f3a43e2d43b067d79a6a1e7f87f8558b
-
SHA256
26d2fd70cd4dfa0469a99ff59ae344390e02cec6b7154dccdd45ef786fa08ab4
-
SHA512
b867217817f2466cb38c17903307af5ac170e626e949e6003be15fece40f1e1301d319b4dad331fdc6074e769a1e82075a1e7178b8f7a62cc09ec24818f88b77
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYn:qDdFJy3QMOtEvwDpjjWMl7Tm
Behavioral task
behavioral1
Sample
2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker
-
Size
40KB
-
MD5
370869683aad44f22e0c1ee5ea67f94d
-
SHA1
8bb868f0f3a43e2d43b067d79a6a1e7f87f8558b
-
SHA256
26d2fd70cd4dfa0469a99ff59ae344390e02cec6b7154dccdd45ef786fa08ab4
-
SHA512
b867217817f2466cb38c17903307af5ac170e626e949e6003be15fece40f1e1301d319b4dad331fdc6074e769a1e82075a1e7178b8f7a62cc09ec24818f88b77
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYn:qDdFJy3QMOtEvwDpjjWMl7Tm
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-