Behavioral task
behavioral1
Sample
58ac8abe9970ab5f0d2a8441d749542e_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
58ac8abe9970ab5f0d2a8441d749542e_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
58ac8abe9970ab5f0d2a8441d749542e_cryptolocker_JC.exe
-
Size
87KB
-
MD5
58ac8abe9970ab5f0d2a8441d749542e
-
SHA1
fe5fc62eef982f2803bc31602fc2da35f0240641
-
SHA256
d8d7b7a766c520a7bd88e03da7f79d6f807d71486b06557684752fd50e98e29c
-
SHA512
4bd3d6f285fb500891670e185d02441a2c080737ee953f487eb55829bafcbd954f1b905e6a6c9f92cafcbb4866ff80050b0dad79021873cdc06f93f12fb99f13
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDDq:zCsanOtEvwDpjL
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58ac8abe9970ab5f0d2a8441d749542e_cryptolocker_JC.exe
Files
-
58ac8abe9970ab5f0d2a8441d749542e_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE