Behavioral task
behavioral1
Sample
2024-09-29_aecd11721f4914aa5aa5bc4c5e26ab1c_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-29_aecd11721f4914aa5aa5bc4c5e26ab1c_cryptolocker
-
Size
97KB
-
MD5
aecd11721f4914aa5aa5bc4c5e26ab1c
-
SHA1
f8289b540e91fa43c13dfee0a0b3cad31250e9a7
-
SHA256
4ad5c32f89abf48aeb60dfc9daec9324a1a31008404d472def381e15a5167682
-
SHA512
66e7ad57f180d0444fbcd1cf9e5301c8082f57827b0236e405187965d733ad99bf33a027a6c889aab0b0b55c75ce63c95c3f0bd63d0a5d8eafcf30e19b057b55
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT71Z3OG:T6a+rdOOtEvwDpjNh
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-29_aecd11721f4914aa5aa5bc4c5e26ab1c_cryptolocker
Files
-
2024-09-29_aecd11721f4914aa5aa5bc4c5e26ab1c_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE