Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker
-
Size
49KB
-
MD5
5623d453f740e87f2e19c5b8b63c3631
-
SHA1
c212bb6572fe90a87c246e1ca91db469004628de
-
SHA256
cae478e78fd772bd8f24016530ab01f8774e6c686d4c37ce81022a67aad3c58a
-
SHA512
c4f8b798f4e4c9e09e1e738f809bcefdb4220d9799eeee96c2236d5a0fe6f5488ffe7da92fa6ecb1ccd3d671f678635c083e4a1754fdff0acb2e94f9ca916683
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52Y:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker
Files
-
2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE