Behavioral task
behavioral1
Sample
2024-09-21_ca100d24a5d095ff8b4f8f498fc6e438_cryptolocker.exe
Resource
win7-20240704-en
General
-
Target
2024-09-21_ca100d24a5d095ff8b4f8f498fc6e438_cryptolocker
-
Size
69KB
-
MD5
ca100d24a5d095ff8b4f8f498fc6e438
-
SHA1
5a655614aca1aa86a7e9c54a48e76d4e3ad7fdc9
-
SHA256
134b3f7030f22b374614643d620f85fcd11711e0e4d8034bef700031d8574354
-
SHA512
645351b0d8582e9aaf2b981607023e3193c7f88c787b2c877c503d24a8b58e4659df1d46aa7bfac4f94b7ceef4e3025921d0b643d7b88d5070d056dee072a5a5
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRJ:1nK6a+qdOOtEvwDpjs
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-21_ca100d24a5d095ff8b4f8f498fc6e438_cryptolocker
Files
-
2024-09-21_ca100d24a5d095ff8b4f8f498fc6e438_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE