Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_3435b13de3832d85b630578c45876454_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_3435b13de3832d85b630578c45876454_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_3435b13de3832d85b630578c45876454_cryptolocker
-
Size
49KB
-
MD5
3435b13de3832d85b630578c45876454
-
SHA1
c9f95b1ff9850a8f00bff008814ac1496d0ce8ca
-
SHA256
ca59a8044c256586ebdb419e58113e4098460a3619fc863de8381045b425083f
-
SHA512
6c8142eb79edb7429b33fc8e02da6a299d85c1539af6134eb7345f3c6d1c9006834294b6f3f1e74bcbc54864a6861f7547a0649c353ba369e4010bbcec146dfc
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvgpnuQ3SzjRf:6j+1NMOtEvwDpjr8hgpuQ34
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule sample CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_MPress -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_3435b13de3832d85b630578c45876454_cryptolocker
Files
-
2024-02-18_3435b13de3832d85b630578c45876454_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 17KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE