Behavioral task
behavioral1
Sample
2024-01-09_81f0cd2a52e5e13d6473d571de40563f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_81f0cd2a52e5e13d6473d571de40563f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_81f0cd2a52e5e13d6473d571de40563f_cryptolocker
-
Size
62KB
-
MD5
81f0cd2a52e5e13d6473d571de40563f
-
SHA1
9d127f7a560baa7a6b10048d1395a67ad51cb45d
-
SHA256
9d15d44d7f9c3a5985787b99a21b242aa53010039ae1c4f124d937a765fe3880
-
SHA512
08655a83d83aefc74e7312872fea4cf2503adac7fa7bc318fceec5c8983e0a766145915167768e3de5d4e8ecbda4ac8d4c1eec17b05c3e3e6b97c49906320af5
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uk:1nK6a+qdOOtEvwDpjJ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-09_81f0cd2a52e5e13d6473d571de40563f_cryptolocker
Files
-
2024-01-09_81f0cd2a52e5e13d6473d571de40563f_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE