Behavioral task
behavioral1
Sample
2024-09-08_1a93c5fa236dc47efac6e364212bfdb1_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-08_1a93c5fa236dc47efac6e364212bfdb1_cryptolocker
-
Size
43KB
-
MD5
1a93c5fa236dc47efac6e364212bfdb1
-
SHA1
7f7d8245feffe2bae6c459bd2483d8b3ff14585e
-
SHA256
ba074e4c3ae1e5bd799e9b897b4cfe1e6a8df165f97be0ef40255b3f20c06fb5
-
SHA512
f72f4b0fcd334f78c307d79584d879546796af8a44504fa0872a8b4933d51489a52d62c11dd338e209207717c59f0b62b3fe868bf54dd76b70f4545cb4b057ab
-
SSDEEP
768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsJg:bO6YcA/Xk3wXFXSqAJN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_1a93c5fa236dc47efac6e364212bfdb1_cryptolocker
Files
-
2024-09-08_1a93c5fa236dc47efac6e364212bfdb1_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE