Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_3ed17277f2cef33f738554412593c92e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_3ed17277f2cef33f738554412593c92e_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-14_3ed17277f2cef33f738554412593c92e_cryptolocker
-
Size
61KB
-
MD5
3ed17277f2cef33f738554412593c92e
-
SHA1
80d1be95c2dd72b8551bc5a0d3c374b29c4a1b3c
-
SHA256
38000426731216ec990c44fa309a9d88463fa046feb58218198c2cbe107587f4
-
SHA512
e6772ca7a19fea35e9c6299b87ef3af134ba9b9f93170e4a41bba9c1e97c0ef6c681f1d670a1958923ad4d6105c8f8826cd2836c5eaca575b07c761a2193459b
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsTN:BbdDmjr+OtEvwDpjM8Z
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-14_3ed17277f2cef33f738554412593c92e_cryptolocker
Files
-
2024-02-14_3ed17277f2cef33f738554412593c92e_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE