Behavioral task
behavioral1
Sample
2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker
-
Size
116KB
-
MD5
114a1f7077efcfa2617065dec9243345
-
SHA1
3c2bda1a673cd6ef2f31b0c677c8c8a33f16f600
-
SHA256
4aa3dc51415c92869929aa600303e6e30726d5f8eedc213fcc8e1c47cd79833d
-
SHA512
13d339f595bb4217007dcd4360a59ea69516bcdc658b5a4df2c61f0f863a8e35e48c952766b8517449477d265576c2cbb5d12577feb687ba46e1c118d00a64ab
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9P:T6a+rdOOtEvwDpjLzD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule sample CryptoLocker_set1 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker
Files
-
2024-02-24_114a1f7077efcfa2617065dec9243345_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE