Behavioral task
behavioral1
Sample
6dc6ab04821849f7e18a40a9446efd9c_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6dc6ab04821849f7e18a40a9446efd9c_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6dc6ab04821849f7e18a40a9446efd9c_cryptolocker_JC.exe
-
Size
68KB
-
MD5
6dc6ab04821849f7e18a40a9446efd9c
-
SHA1
272a0534e40ab633a8bb47441423a46df0207b9e
-
SHA256
53e7f3c65d3704f7dbd41cfe79d7a81a1810b936027372e9b998de1dcc160417
-
SHA512
eef986730663ff84a78310615473bd8d75c97411ef1438574001ae24ede457eccd7a715f3913323e3ee7439c9380cd1cf5d81527c115051128e2ad27b2bf45cf
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzI0:1nK6a+qdOOtEvwDpjm
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6dc6ab04821849f7e18a40a9446efd9c_cryptolocker_JC.exe
Files
-
6dc6ab04821849f7e18a40a9446efd9c_cryptolocker_JC.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE