Behavioral task
behavioral1
Sample
76bfa280d3dc9d5431e82b39f5370142_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
76bfa280d3dc9d5431e82b39f5370142_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
76bfa280d3dc9d5431e82b39f5370142_cryptolocker_JC.exe
-
Size
85KB
-
MD5
76bfa280d3dc9d5431e82b39f5370142
-
SHA1
04fb626ebe792840c55464dc837a26378960c3eb
-
SHA256
377d5021c509eb10f4a46df8c25146c0c137630a1fcaf4de40cf51b6e28e51cc
-
SHA512
79759d39d368255f2096c521a05e3fc10f0f983672ca27357d93659ec7e563a101702fb1db8b25d4857fedca889fdc59de5fde0ce4a8bcfbfe3304c1526ce3cb
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj+Q:zCsanOtEvwDpjq
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76bfa280d3dc9d5431e82b39f5370142_cryptolocker_JC.exe
Files
-
76bfa280d3dc9d5431e82b39f5370142_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE