General
-
Target
2024-06-14_4123c1dfd241fc490264a5c5b779e140_cryptolocker
-
Size
74KB
-
Sample
240614-rw6daavbpd
-
MD5
4123c1dfd241fc490264a5c5b779e140
-
SHA1
eec755ae51b6f445ae03d9a954c092e5b9320f31
-
SHA256
36f120a9f2d08ebfc602b7d174f4baf3b14f895af56849ec1e5c8c0e1ea9b144
-
SHA512
7002b79057571b77cc76a240e5422c17d9d3769a9897b4b983352880bda1be750ac6906c9a2faff53c42c86b47370d7f2a96fba172723cca89397039616ebd8c
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95bm:C4Q2c94OtEvwDpj4H8zB
Behavioral task
behavioral1
Sample
2024-06-14_4123c1dfd241fc490264a5c5b779e140_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-14_4123c1dfd241fc490264a5c5b779e140_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-14_4123c1dfd241fc490264a5c5b779e140_cryptolocker
-
Size
74KB
-
MD5
4123c1dfd241fc490264a5c5b779e140
-
SHA1
eec755ae51b6f445ae03d9a954c092e5b9320f31
-
SHA256
36f120a9f2d08ebfc602b7d174f4baf3b14f895af56849ec1e5c8c0e1ea9b144
-
SHA512
7002b79057571b77cc76a240e5422c17d9d3769a9897b4b983352880bda1be750ac6906c9a2faff53c42c86b47370d7f2a96fba172723cca89397039616ebd8c
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs95bm:C4Q2c94OtEvwDpj4H8zB
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-