Behavioral task
behavioral1
Sample
9afcd7f4a1e5954180bfa42846de3a91_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9afcd7f4a1e5954180bfa42846de3a91_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9afcd7f4a1e5954180bfa42846de3a91_cryptolocker_JC.exe
-
Size
87KB
-
MD5
9afcd7f4a1e5954180bfa42846de3a91
-
SHA1
c9c0d800f3fc815070de15b8638f3154d29a5616
-
SHA256
b4ea30e9d462772332ce5b76fef98f28ef61a8d9116315f15efe4c9a5070970f
-
SHA512
15e8ac760b4b09b755bf5d69508d7654c982983596d3bc2bbd659ad48ec082265d2525782883df807e9218fcf138606a9bee11db913a00391b31808ecfd7f54b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9Y:zCsanOtEvwDpjP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9afcd7f4a1e5954180bfa42846de3a91_cryptolocker_JC.exe
Files
-
9afcd7f4a1e5954180bfa42846de3a91_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE