Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_fa86f23e9ecc7ec093a3142d12943577_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_fa86f23e9ecc7ec093a3142d12943577_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_fa86f23e9ecc7ec093a3142d12943577_cryptolocker
-
Size
30KB
-
MD5
fa86f23e9ecc7ec093a3142d12943577
-
SHA1
6460103add111d8baa2140fc7c7c8024a25ff070
-
SHA256
f3a55cf286fc1c6c0e53e8fbbbdb388d44ab9ba724262e8162c896a4bafc2ef8
-
SHA512
7fcd8dcc1bbcb4f5c1b58c14225c7cc7f36db61ed785a7b5571f5d845a76db6cca79fcf591a3c8c953004ea763dba9e17a587328853160f71e92a744610a043d
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHn:q0zizzOSxMOtEvwDpj/arqH
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-27_fa86f23e9ecc7ec093a3142d12943577_cryptolocker
Files
-
2024-01-27_fa86f23e9ecc7ec093a3142d12943577_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
ukiwGhLB Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MIZwSMcb Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE