Behavioral task
behavioral1
Sample
756323a84b5c1d9f0cdf94aef1c764c8_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
756323a84b5c1d9f0cdf94aef1c764c8_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
756323a84b5c1d9f0cdf94aef1c764c8_cryptolocker_JC.exe
-
Size
60KB
-
MD5
756323a84b5c1d9f0cdf94aef1c764c8
-
SHA1
31cb23c26bdb729361820b744b03ada7db7a267f
-
SHA256
2437a8f54b59ceea435cbe72d669fc70240c01b6c3bbcb0884d812e0a23a4756
-
SHA512
bc3b4c823418aa448be0a3ba04df78a7669e33673a1355c1b58b60bae215477c43ffc439c14e0b27073f0f612436a29577d62ff466494474e37d58d17c11b215
-
SSDEEP
768:qImnjO6LsoEEeegiZPvEhHSG+g0mum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+g0fmddpMOtEvwDpj
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 756323a84b5c1d9f0cdf94aef1c764c8_cryptolocker_JC.exe
Files
-
756323a84b5c1d9f0cdf94aef1c764c8_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE