General
-
Target
2024-06-13_316c98599c0d7c1a77aa1c1c63eb7f80_cryptolocker
-
Size
65KB
-
Sample
240613-d1sq4aweqk
-
MD5
316c98599c0d7c1a77aa1c1c63eb7f80
-
SHA1
e912004a6162f3259d87d30822283b8cd546708c
-
SHA256
7f6b4d24158c59b9a6fa7c9d0f315288f5de1c63b5116bb2df87e8756e7b7088
-
SHA512
5b5c9d1862089ec5311ca913ae03dd25789895471505bd4e3d9a5aeb6824b0c11318b6977127e099d03726a99017d8b7d401ce41cba8a2332aa69ab73390233d
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiP:BbdDmjr+OtEvwDpjM8C
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_316c98599c0d7c1a77aa1c1c63eb7f80_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-13_316c98599c0d7c1a77aa1c1c63eb7f80_cryptolocker.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-13_316c98599c0d7c1a77aa1c1c63eb7f80_cryptolocker
-
Size
65KB
-
MD5
316c98599c0d7c1a77aa1c1c63eb7f80
-
SHA1
e912004a6162f3259d87d30822283b8cd546708c
-
SHA256
7f6b4d24158c59b9a6fa7c9d0f315288f5de1c63b5116bb2df87e8756e7b7088
-
SHA512
5b5c9d1862089ec5311ca913ae03dd25789895471505bd4e3d9a5aeb6824b0c11318b6977127e099d03726a99017d8b7d401ce41cba8a2332aa69ab73390233d
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiP:BbdDmjr+OtEvwDpjM8C
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-