General
-
Target
2024-06-12_9a48475b7fba22094f1804d4f27915d0_cryptolocker
-
Size
63KB
-
Sample
240612-y5189asfll
-
MD5
9a48475b7fba22094f1804d4f27915d0
-
SHA1
c198d9af260176fcd100e0ac8679c975fb7a5d58
-
SHA256
4b729ee029de3e256405a06b72bc0f6ae63bf985a75b3ceff3f67c3ab73090b5
-
SHA512
870b56849f0b7d48bdf77b1919373a616c060b9ebe97bf512c9e1f041e4fc2e20ab736d2c3fe016aa52e1b1b91d5ea1a605f1863531554de73c0e8b875400771
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zr:0j+soPSMOtEvwDpjwizbR9Xwzr
Behavioral task
behavioral1
Sample
2024-06-12_9a48475b7fba22094f1804d4f27915d0_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_9a48475b7fba22094f1804d4f27915d0_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-12_9a48475b7fba22094f1804d4f27915d0_cryptolocker
-
Size
63KB
-
MD5
9a48475b7fba22094f1804d4f27915d0
-
SHA1
c198d9af260176fcd100e0ac8679c975fb7a5d58
-
SHA256
4b729ee029de3e256405a06b72bc0f6ae63bf985a75b3ceff3f67c3ab73090b5
-
SHA512
870b56849f0b7d48bdf77b1919373a616c060b9ebe97bf512c9e1f041e4fc2e20ab736d2c3fe016aa52e1b1b91d5ea1a605f1863531554de73c0e8b875400771
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zr:0j+soPSMOtEvwDpjwizbR9Xwzr
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-