Static task
static1
Behavioral task
behavioral1
Sample
2024-07-07_ada4ae189467a7288f665897e1a0f913_cryptolocker.exe
Behavioral task
behavioral2
Sample
2024-07-07_ada4ae189467a7288f665897e1a0f913_cryptolocker.exe
General
-
Target
2024-07-07_ada4ae189467a7288f665897e1a0f913_cryptolocker
-
Size
65KB
-
MD5
ada4ae189467a7288f665897e1a0f913
-
SHA1
14c1baac33fc53bca165415dba628ff92e8af0e1
-
SHA256
8cfd22f2e716b90429ec87a9c0211eeffd8e410560bc4e832664edaca1d9b24a
-
SHA512
7ca11c521d00b2e1119b6dc2838ece57e325f0d65adcb07d3211554453c07f43d868f9761e0673b40dcf09a3f605a92c70fdae1591d4919a19d17a986e287dc8
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihrm:BbdDmjr+OtEvwDpjM8x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-07_ada4ae189467a7288f665897e1a0f913_cryptolocker
Files
-
2024-07-07_ada4ae189467a7288f665897e1a0f913_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bUItIFMf Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
QNhjSkbP Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE