Behavioral task
behavioral1
Sample
2024-09-06_4cf36c626191e8245e927a26800e0132_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-06_4cf36c626191e8245e927a26800e0132_cryptolocker
-
Size
53KB
-
MD5
4cf36c626191e8245e927a26800e0132
-
SHA1
6321c4b6983833abc033df149a35f10b60f7b087
-
SHA256
238a63928b469b95ae68b7872c984d2f09022d677ea0049219857794b572549f
-
SHA512
ee9c074b6e0656d72a1c41a6496e5ed338a8d41c77a85d73c899c1bfddbea87a367a57478252d734ef259f0679aa82f877aba7bcf7dc8e28e25a3ebd4a92a14b
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOfnt:bODOw9acifAoc+va
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_4cf36c626191e8245e927a26800e0132_cryptolocker
Files
-
2024-09-06_4cf36c626191e8245e927a26800e0132_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE