General
-
Target
2024-06-14_3b9afe5413c8d73341836a2a66f17863_cryptolocker
-
Size
41KB
-
Sample
240614-jesrvstgnq
-
MD5
3b9afe5413c8d73341836a2a66f17863
-
SHA1
d9397b1d3bdc4c8dce180608a14b781f69176fd3
-
SHA256
6a044ca23b55543f1cf9bda6860b8f2407183c7a6daeb38da221fa9d4686359c
-
SHA512
e93ba7e23d53bc0e4f012ba76e05228f6e688a5d636a4289dc213760822e395188361f56a35257c6435a87f9e9e6441114f99899f45c8e8ea979825b26d415a9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYfz:qDdFJy3QMOtEvwDpjjWMl7TYz
Behavioral task
behavioral1
Sample
2024-06-14_3b9afe5413c8d73341836a2a66f17863_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_3b9afe5413c8d73341836a2a66f17863_cryptolocker.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-06-14_3b9afe5413c8d73341836a2a66f17863_cryptolocker
-
Size
41KB
-
MD5
3b9afe5413c8d73341836a2a66f17863
-
SHA1
d9397b1d3bdc4c8dce180608a14b781f69176fd3
-
SHA256
6a044ca23b55543f1cf9bda6860b8f2407183c7a6daeb38da221fa9d4686359c
-
SHA512
e93ba7e23d53bc0e4f012ba76e05228f6e688a5d636a4289dc213760822e395188361f56a35257c6435a87f9e9e6441114f99899f45c8e8ea979825b26d415a9
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYfz:qDdFJy3QMOtEvwDpjjWMl7TYz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-