General
-
Target
2024-06-16_c80c2ec738e2154ff58d1e9ada47cd0f_cryptolocker
-
Size
94KB
-
Sample
240616-x6ax1sxgrr
-
MD5
c80c2ec738e2154ff58d1e9ada47cd0f
-
SHA1
cd945ce91c030c65190cf97966d8a969ec79196b
-
SHA256
78c20791e3b38cf6a254787d3d8b4ef89f8e68cfd53d70c33f138c571c249c1c
-
SHA512
5de89e242d62cc90bf8fcef3aaacf28461b8c17d39324e5c40360244e2ec1a0f0c37a7ab7fdefe88cb3d991e40890c7aff1482903f4037ef56bf97998dc41ae2
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kH:zCsanOtEvwDpjBM
Behavioral task
behavioral1
Sample
2024-06-16_c80c2ec738e2154ff58d1e9ada47cd0f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-16_c80c2ec738e2154ff58d1e9ada47cd0f_cryptolocker.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-16_c80c2ec738e2154ff58d1e9ada47cd0f_cryptolocker
-
Size
94KB
-
MD5
c80c2ec738e2154ff58d1e9ada47cd0f
-
SHA1
cd945ce91c030c65190cf97966d8a969ec79196b
-
SHA256
78c20791e3b38cf6a254787d3d8b4ef89f8e68cfd53d70c33f138c571c249c1c
-
SHA512
5de89e242d62cc90bf8fcef3aaacf28461b8c17d39324e5c40360244e2ec1a0f0c37a7ab7fdefe88cb3d991e40890c7aff1482903f4037ef56bf97998dc41ae2
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kH:zCsanOtEvwDpjBM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-