General
-
Target
2024-06-14_b1efbb563a860666af007f17e10d4923_cryptolocker
-
Size
41KB
-
Sample
240614-ys13qaxfjn
-
MD5
b1efbb563a860666af007f17e10d4923
-
SHA1
7fd06b41e2308a275e2cc66bacd00c19753054e9
-
SHA256
a49e11856345943cc420e9b1f8f877d6fe002baaad64b3ed56333078570ea843
-
SHA512
7bd34e5ac564a78507a6761452cf596ecf9ad7b81df86ddce0103c1f100ac1d4a1fb71a1ca7698baf686bf11ced2a3b61edd1c4b6b0d1a4ab558ab43d3b95279
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hfu:qDdFJy3QMOtEvwDpjjWMl7T8u
Behavioral task
behavioral1
Sample
2024-06-14_b1efbb563a860666af007f17e10d4923_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_b1efbb563a860666af007f17e10d4923_cryptolocker.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-14_b1efbb563a860666af007f17e10d4923_cryptolocker
-
Size
41KB
-
MD5
b1efbb563a860666af007f17e10d4923
-
SHA1
7fd06b41e2308a275e2cc66bacd00c19753054e9
-
SHA256
a49e11856345943cc420e9b1f8f877d6fe002baaad64b3ed56333078570ea843
-
SHA512
7bd34e5ac564a78507a6761452cf596ecf9ad7b81df86ddce0103c1f100ac1d4a1fb71a1ca7698baf686bf11ced2a3b61edd1c4b6b0d1a4ab558ab43d3b95279
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hfu:qDdFJy3QMOtEvwDpjjWMl7T8u
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-