Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_8fe9369e22b40a26f9991fc636a8dda8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_8fe9369e22b40a26f9991fc636a8dda8_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-17_8fe9369e22b40a26f9991fc636a8dda8_cryptolocker
-
Size
50KB
-
MD5
8fe9369e22b40a26f9991fc636a8dda8
-
SHA1
210735e66088942912a9411f81bacc2e951237f6
-
SHA256
5d0e5ca85c68e13788abe87541f7d77efb941155c6e66d382e681ff12616d5e1
-
SHA512
2f2b4405000c277143ec0e1dba27d139e63a1ab6f71faa56b6dea2f1f9b289a0f3ec1f66c990b1ba4b02627381d0291bbcbea799b3a885eb85dc864e305ed141
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc5:qmbhXDmjr5MOtEvwDpj5cDtKkQZQtd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-17_8fe9369e22b40a26f9991fc636a8dda8_cryptolocker
Files
-
2024-05-17_8fe9369e22b40a26f9991fc636a8dda8_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE