Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_6bc97057d69921525222eb437eab57f1_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-24_6bc97057d69921525222eb437eab57f1_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_6bc97057d69921525222eb437eab57f1_cryptolocker
-
Size
46KB
-
MD5
6bc97057d69921525222eb437eab57f1
-
SHA1
2231a3bfa1a4c6beae1fa9adb720f746bc55beb6
-
SHA256
8ce844308c7c2e6724e1cc26450d76978a134f61c9f6b8cf1e341c37ef281845
-
SHA512
1d5ab036542910226d695933284f0701b6aca6ee84078c3a9309ebb902b7501e593df2966f078c00d9e80c452633db8b5d43faa2d467b361ec8862136cc17b36
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLY:qmbhXDmjr5MOtEvwDpj5cDtKkQZQu
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_6bc97057d69921525222eb437eab57f1_cryptolocker
Files
-
2024-05-24_6bc97057d69921525222eb437eab57f1_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE