General
-
Target
2024-06-20_07d4b42d1e7b0f97ee9d43b4fef5ed74_cryptolocker
-
Size
63KB
-
Sample
240620-ngjn7avcje
-
MD5
07d4b42d1e7b0f97ee9d43b4fef5ed74
-
SHA1
1e2fe8234d812223fa67585ddbd780672ebb150e
-
SHA256
bed99faddd8ae9329072bf9b49677eb7bbfb6891e059b69e3ca952896ad58b4b
-
SHA512
847ce9d7dc53165177143c0927720773dfbaab131f7a8847d5c3e6592582faca6b758c248eb74cf78e0b5adbd607d7368cc6462dcfb7a8564185f835ecdbd8c2
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zz:0j+soPSMOtEvwDpjwizbR9Xwzz
Behavioral task
behavioral1
Sample
2024-06-20_07d4b42d1e7b0f97ee9d43b4fef5ed74_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-20_07d4b42d1e7b0f97ee9d43b4fef5ed74_cryptolocker.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-20_07d4b42d1e7b0f97ee9d43b4fef5ed74_cryptolocker
-
Size
63KB
-
MD5
07d4b42d1e7b0f97ee9d43b4fef5ed74
-
SHA1
1e2fe8234d812223fa67585ddbd780672ebb150e
-
SHA256
bed99faddd8ae9329072bf9b49677eb7bbfb6891e059b69e3ca952896ad58b4b
-
SHA512
847ce9d7dc53165177143c0927720773dfbaab131f7a8847d5c3e6592582faca6b758c248eb74cf78e0b5adbd607d7368cc6462dcfb7a8564185f835ecdbd8c2
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zz:0j+soPSMOtEvwDpjwizbR9Xwzz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-