Behavioral task
behavioral1
Sample
2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker
-
Size
52KB
-
MD5
d330a1c2be9ecf64b084d9cc559d5cbe
-
SHA1
7e1f86325ef2e11ddf0b819ac83ef666a278b787
-
SHA256
615e4dd2df36c3ed9398c1f7f249fe64338e779a91c7ea6b6fab9affb6c20877
-
SHA512
054136d75b5aa3d9298fdeb0532f42ab3db791c9e88d70177332024e88e3669e7873db638c58ba333fe90093ee52071f33d5293396df6d89b0ed4c33d9c4fd0a
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXa:bODOw9acifAoc+vXa
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker
Files
-
2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE