General
-
Target
2024-06-13_beda9efbb429183bb17cd7fa374a87ad_cryptolocker
-
Size
90KB
-
Sample
240613-edqhwsxanr
-
MD5
beda9efbb429183bb17cd7fa374a87ad
-
SHA1
d2ad341b6491a1e2c52265edd12f2d091852c001
-
SHA256
a71f2d4f96bb953764ecd54f8fa5698556505915d3df523974e72ceea1def66c
-
SHA512
9a106dff03f8340236d398775892f5fb2db0153c589381eed74e707c54d080737630b9a5dc830354a92b00c5e0a02c50c1a023280e12271201612039385c7392
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Nf:n6a+1SEOtEvwDpjYYvQd2Pu
Behavioral task
behavioral1
Sample
2024-06-13_beda9efbb429183bb17cd7fa374a87ad_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-13_beda9efbb429183bb17cd7fa374a87ad_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-13_beda9efbb429183bb17cd7fa374a87ad_cryptolocker
-
Size
90KB
-
MD5
beda9efbb429183bb17cd7fa374a87ad
-
SHA1
d2ad341b6491a1e2c52265edd12f2d091852c001
-
SHA256
a71f2d4f96bb953764ecd54f8fa5698556505915d3df523974e72ceea1def66c
-
SHA512
9a106dff03f8340236d398775892f5fb2db0153c589381eed74e707c54d080737630b9a5dc830354a92b00c5e0a02c50c1a023280e12271201612039385c7392
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Nf:n6a+1SEOtEvwDpjYYvQd2Pu
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-