Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_238c8569c05023e9c166a611cfd46d06_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_238c8569c05023e9c166a611cfd46d06_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-27_238c8569c05023e9c166a611cfd46d06_cryptolocker
-
Size
64KB
-
MD5
238c8569c05023e9c166a611cfd46d06
-
SHA1
e0d46585d7cc76ea37d3cb35ebfff53a1eeace62
-
SHA256
5cf2aa65d4c5c68916ae55c630038af9c693ad5d5775308960d2d954115d0ecb
-
SHA512
fff9480557c3264687c3683f631f0bd3df594a02f3ae78794cab16fbacf8b4c2dd7e0fbbecdca47c232df3f90a941868c20ff575347cdd3a477a9195f73d85b7
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi/y:BbdDmjr+OtEvwDpjM8v
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-27_238c8569c05023e9c166a611cfd46d06_cryptolocker
Files
-
2024-05-27_238c8569c05023e9c166a611cfd46d06_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE