Behavioral task
behavioral1
Sample
6029d9250b7f2abcd69c26da01ce4631_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6029d9250b7f2abcd69c26da01ce4631_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6029d9250b7f2abcd69c26da01ce4631_cryptolocker_JC.exe
-
Size
87KB
-
MD5
6029d9250b7f2abcd69c26da01ce4631
-
SHA1
122bee00bac6c8edce0ca71afa515dfc9fa9085e
-
SHA256
de7ac2e552a15af021ab55782a3132d63a9e5990378fa8accd382dde453b2375
-
SHA512
c71c36c70920336d76f7700a01b035b7d279e059bb51055e14b8ee7f1aef5d62de303edc13d183cff33c87bd40420f234066fd17c1f51c244276d14e37c583ab
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDi/:zCsanOtEvwDpj3
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6029d9250b7f2abcd69c26da01ce4631_cryptolocker_JC.exe
Files
-
6029d9250b7f2abcd69c26da01ce4631_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE