Behavioral task
behavioral1
Sample
2024-10-14_c9c5005512611ef72d63cf22b3348140_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-14_c9c5005512611ef72d63cf22b3348140_cryptolocker
-
Size
55KB
-
MD5
c9c5005512611ef72d63cf22b3348140
-
SHA1
4eea1afe6edd2120de53a3522c8e48f4cdb146bf
-
SHA256
2e143d5bcd4d09e15f562ddcba0182f2ec3e524cbe28bdb29964622467669d18
-
SHA512
a7112d2bfb6bbfc0845b9f4cc64d50f7fd6110247442e6dfca808003bd4dae21462a93a55ae7e2cc949fb1afe979d45da22ff3c10b5adf804ed54ff1520d9245
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgmHU:z6QFElP6n+gKmddpMOtEvwDpj31ikgm0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-14_c9c5005512611ef72d63cf22b3348140_cryptolocker
Files
-
2024-10-14_c9c5005512611ef72d63cf22b3348140_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE