Behavioral task
behavioral1
Sample
58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe
-
Size
84KB
-
MD5
58026446c1664995c090482fb8c742ac
-
SHA1
54294b021b1b85421db4c79ece422b60f64c5b74
-
SHA256
cb3d893b6c54f70979be4a2c75c2fa82b5a5bea0e4cc6aeb69ddd8bc66f0fde8
-
SHA512
406caf01152ce04bed34d40ac2d5479b2a08e03c3b183591df1301e6068bda67c3c511abc456ceb7765ea3d2bb82d6e887dff70c37a93d2179a111c92f7d1503
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRD+A:zCsanOtEvwDpjU
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe
Files
-
58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE