Behavioral task
behavioral1
Sample
fdbd4269fb31a676be524d60d9919160_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fdbd4269fb31a676be524d60d9919160_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
fdbd4269fb31a676be524d60d9919160_cryptolocker_JC.exe
-
Size
60KB
-
MD5
fdbd4269fb31a676be524d60d9919160
-
SHA1
b7cd8de833833e5bc6dfc9cfafd845dcb76b8592
-
SHA256
640af22b592f7c2f9673dd36986d7bafd52d6d0e94733f6bc4a746c200000aa2
-
SHA512
d394ac044d40dcf920cca8b94d6f51c66ff9b5602308463bb031a08456ac7d521389e76800fa1888d2d15c4b92baf0ca3b2958699d4f4f0c91d8326292fac78a
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+ga8um/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gaJmddpMOtEvwDpj
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdbd4269fb31a676be524d60d9919160_cryptolocker_JC.exe
Files
-
fdbd4269fb31a676be524d60d9919160_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE