Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker
-
Size
32KB
-
MD5
1ee31c44555bd9b388c826f5152a1f30
-
SHA1
a05e50d05a8d719c48b4b73cf61333499658e36f
-
SHA256
3cd1fab2f01273af5b5b09b354ca3fd2a5a316d2a84890d75155bdffc0ff7add
-
SHA512
363bf3f27305d05dbfa0efff009d86443be0babb4e6ce74a1da799a78d288926394830b7f26cf484e7f1bf105d309b68a1bad0e19ad6ad3dfc68b5c5cd421eea
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHbjuM:q0zizzOSxMOtEvwDpj/arq2M
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker
Files
-
2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
ukiwGhLB Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MIZwSMcb Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE