Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_ab0f9c1a51e2cd504d3fcc4bfc58b96a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_ab0f9c1a51e2cd504d3fcc4bfc58b96a_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_ab0f9c1a51e2cd504d3fcc4bfc58b96a_cryptolocker
-
Size
42KB
-
MD5
ab0f9c1a51e2cd504d3fcc4bfc58b96a
-
SHA1
b68f833f0aaa948201c9afe836e7f436b0e4663a
-
SHA256
e3a1498a355988dc0808abe2ed8f06c0ebf256fa9f5dc52f1ed9662fd30f5086
-
SHA512
95eefc4736da0781fab89f3d83517b350ac0610fcf1968fe66550c5f55b0547987dd9a71bae70793d75ebeb91c66a2ace2fdf7d0cb7f06a290072f37e3ee069f
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuDb7xLg:ZzFbxmLPWQMOtEvwDpjLeJAsKcb7G
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule sample CryptoLocker_rule2 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-22_ab0f9c1a51e2cd504d3fcc4bfc58b96a_cryptolocker
Files
-
2024-05-22_ab0f9c1a51e2cd504d3fcc4bfc58b96a_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
petite Size: 334B - Virtual size: 334B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ