General
-
Target
2024-06-13_51caf9e289e05a2574ebe09949ddcc07_cryptolocker
-
Size
60KB
-
Sample
240613-aw4e9axcmf
-
MD5
51caf9e289e05a2574ebe09949ddcc07
-
SHA1
2431132fb28781587107f682ce7fd30cf4a19a5f
-
SHA256
9f1ddb92c2260d06635ed3c38944e2b8e8f067b1a7a14bb827e91bcaa1553e93
-
SHA512
b0acd45879729a8f2e8fe1b2912d7d9118117113ef35b9a5b8704e3c85890516bc3d305ec7aa0d874172e983d0a203a92dda2e11be5801311d401b5d482ee12b
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjKO:H6QFElP6n+gou9cvMOtEvwDpjCpVXTO
Behavioral task
behavioral1
Sample
2024-06-13_51caf9e289e05a2574ebe09949ddcc07_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-13_51caf9e289e05a2574ebe09949ddcc07_cryptolocker.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-13_51caf9e289e05a2574ebe09949ddcc07_cryptolocker
-
Size
60KB
-
MD5
51caf9e289e05a2574ebe09949ddcc07
-
SHA1
2431132fb28781587107f682ce7fd30cf4a19a5f
-
SHA256
9f1ddb92c2260d06635ed3c38944e2b8e8f067b1a7a14bb827e91bcaa1553e93
-
SHA512
b0acd45879729a8f2e8fe1b2912d7d9118117113ef35b9a5b8704e3c85890516bc3d305ec7aa0d874172e983d0a203a92dda2e11be5801311d401b5d482ee12b
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAPjKO:H6QFElP6n+gou9cvMOtEvwDpjCpVXTO
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-