Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_bb5ff6481cb652d225b66bff1c1161d2_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-12_bb5ff6481cb652d225b66bff1c1161d2_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_bb5ff6481cb652d225b66bff1c1161d2_cryptolocker
-
Size
56KB
-
MD5
bb5ff6481cb652d225b66bff1c1161d2
-
SHA1
8e7372a1119d42144bc4809cb49f3efffa52645b
-
SHA256
300b8e22e75015ad9927825df58f15dc4c97e211564a2e45abec8c85e3327ff3
-
SHA512
f1a3c1cdf8766e714f05675aa8843d0ec4579b1806c7d8d80aa8118013f502d764efd4169496c0aa0f187102390e8fc70dacf915e59efbe33d9e267ad9eae192
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616U:BbdDmjr+OtEvwDpjMF
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-12_bb5ff6481cb652d225b66bff1c1161d2_cryptolocker
Files
-
2024-02-12_bb5ff6481cb652d225b66bff1c1161d2_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE