Behavioral task
behavioral1
Sample
2024-09-08_d19aa61fa5480641362efa7bc45e58f3_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-08_d19aa61fa5480641362efa7bc45e58f3_cryptolocker
-
Size
55KB
-
MD5
d19aa61fa5480641362efa7bc45e58f3
-
SHA1
86d800311949f67e876c1c6f18f9f16e3e884f37
-
SHA256
0a770240582bcc92483bfe0370f8c30f2a603bd043a49e03ebf649fda62721b1
-
SHA512
96514aed5a4535fb39370f7165acd6de67e2a43d045f2cbe1f389b8b97ef066eba2c7a0e29c1b27873c2d7c9a93b8929acfa83aa62c1b7cc811d0265142f232b
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkahG:z6QFElP6n+gKmddpMOtEvwDpj31ikT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_d19aa61fa5480641362efa7bc45e58f3_cryptolocker
Files
-
2024-09-08_d19aa61fa5480641362efa7bc45e58f3_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE