Behavioral task
behavioral1
Sample
2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker
-
Size
46KB
-
MD5
871823b4dc5cda1e5f7b193efc521380
-
SHA1
2620f4926c09c7c2f9724a29658ff5daf8d4ea17
-
SHA256
0e5dc99e1f7715b61d3b1c430659175fea62fb883c22a9e9855a119d7530968f
-
SHA512
421ebbbd8af601910c4c5fd2c92c74395c08ff1af06b572fac27515b36d3e06c22da4d8aef4260519f19359d7e4e10737b567c6b0c364af7b559f6b799d3fddf
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqM:bODOw9acifH+YM
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker
Files
-
2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE