Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_feb1f190dd15e582e7866c2b73d8b3dc_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_feb1f190dd15e582e7866c2b73d8b3dc_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_feb1f190dd15e582e7866c2b73d8b3dc_cryptolocker
-
Size
30KB
-
MD5
feb1f190dd15e582e7866c2b73d8b3dc
-
SHA1
c7d6679c35dae6700de39ec8de50a796d5336071
-
SHA256
8c4765d115f9177d9061843c081ddb68d605d9e7536ed4aab54809abb39e58ad
-
SHA512
d2250704374786a8b4368842f4adf7509af56db6a68153262e489dc116bb63779edd2e25e699081237f5a617d8a8166dd53d75acabc5a6b2d4644674ed8d7505
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xT9+:q0zizzOSxMOtEvwDpj/arn+
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-29_feb1f190dd15e582e7866c2b73d8b3dc_cryptolocker
Files
-
2024-01-29_feb1f190dd15e582e7866c2b73d8b3dc_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
ukiwGhLB Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MIZwSMcb Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE