General
-
Target
2024-06-14_def904c13f6dd02ce4898ac7ec51b55a_cryptolocker
-
Size
41KB
-
Sample
240614-b4w7kszhka
-
MD5
def904c13f6dd02ce4898ac7ec51b55a
-
SHA1
07cd5cbfebd7c56c3e19756cfe73c6f1c5277b01
-
SHA256
dacfb4603c583d34cc75b3edc8b37f038d4d80c137797b27a87a6d58c0c0103e
-
SHA512
3d64a1fa12110baccc18c8ebea693aaf3f3a4ae0d4c14764e46ed5678fae79a17aedac044c717c38569f2302b72467438e14a0842fbff6840f6b54751f2593d3
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYj:qDdFJy3QMOtEvwDpjjWMl7TC
Behavioral task
behavioral1
Sample
2024-06-14_def904c13f6dd02ce4898ac7ec51b55a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_def904c13f6dd02ce4898ac7ec51b55a_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-14_def904c13f6dd02ce4898ac7ec51b55a_cryptolocker
-
Size
41KB
-
MD5
def904c13f6dd02ce4898ac7ec51b55a
-
SHA1
07cd5cbfebd7c56c3e19756cfe73c6f1c5277b01
-
SHA256
dacfb4603c583d34cc75b3edc8b37f038d4d80c137797b27a87a6d58c0c0103e
-
SHA512
3d64a1fa12110baccc18c8ebea693aaf3f3a4ae0d4c14764e46ed5678fae79a17aedac044c717c38569f2302b72467438e14a0842fbff6840f6b54751f2593d3
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYj:qDdFJy3QMOtEvwDpjjWMl7TC
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-