Behavioral task
behavioral1
Sample
2024-04-27_59fd1c44dd996480cf1bd33a24dfa229_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-27_59fd1c44dd996480cf1bd33a24dfa229_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_59fd1c44dd996480cf1bd33a24dfa229_cryptolocker
-
Size
61KB
-
MD5
59fd1c44dd996480cf1bd33a24dfa229
-
SHA1
2ac6fadd12645769146978025ccf132f6f463c61
-
SHA256
c8b8bb3c7c7cc452b2ee4c5c4f3450ad10a2f7cff120ffc5264bf39adec9880a
-
SHA512
c90f0c5055c1b0ec13df8aecca22e9261b16258dd4cfa2fa24f1a655bdb9a595f1a7284b12e2de1b0f21e588f3d001482100cf42cb8dcfa13081d4cfca6d02d7
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMhY:1nK6a+qdOOtEvwDpjI
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule sample CryptoLocker_set1 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_59fd1c44dd996480cf1bd33a24dfa229_cryptolocker
Files
-
2024-04-27_59fd1c44dd996480cf1bd33a24dfa229_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE