Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_bae365a42038003d806db3dd465f4124_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_bae365a42038003d806db3dd465f4124_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-18_bae365a42038003d806db3dd465f4124_cryptolocker
-
Size
45KB
-
MD5
bae365a42038003d806db3dd465f4124
-
SHA1
a449b03465f24e83462208f71fac4e3eeabd09f0
-
SHA256
e923440096b4e6625221a7bef0a190caaf2d950fc07ea3212bc712396b85f278
-
SHA512
1f40e8b658cbc8d0fd40ad6731473e1622dcb43a0e8931b97a26932c71cb7e3ac80e54c8b3434332fe70ce05170046f364e2f70249c335a96f8c3f869f0f9c31
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoV:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ7
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_bae365a42038003d806db3dd465f4124_cryptolocker
Files
-
2024-03-18_bae365a42038003d806db3dd465f4124_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE