Behavioral task
behavioral1
Sample
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker
-
Size
25KB
-
MD5
022e872535aa9e63cc3581ab61ec70d2
-
SHA1
afcff7274f5a022e2783afa9ce3d9c7c57f16fd1
-
SHA256
5387cc193ecbd9a76163d9281cefd716005d9e1677dce504815b91e2692792c5
-
SHA512
0603ae671c75bf4c90e51227666b178dd03d4a01c88fe001f83b2e0415e74bc1853316b2fc22c1e9d2c304dc2b5dd52742dce28bdf8e20ffa4cc64860bfb1efa
-
SSDEEP
384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTE:bYOdVB2jXUrMkvnbcuyD7UFXOo
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule sample CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker
Files
-
2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE