Behavioral task
behavioral1
Sample
2024-10-15_e9a9d6d3824e67a5da6384c85634358e_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-15_e9a9d6d3824e67a5da6384c85634358e_cryptolocker
-
Size
62KB
-
MD5
e9a9d6d3824e67a5da6384c85634358e
-
SHA1
911700ffe76bd05b80a4d26e3d3a07664436ecb8
-
SHA256
55b73f21e1f2ce8b8f106e4a0c5a59958915cda7178446df83863129aa9320b4
-
SHA512
f9e533da7e3c96c02e38da3210bf7f38de6f3ecd5b86fce93052b5e1c444eff77105eef1c71c217c3039a5e9427d7cf7bb3f3979d1f4041cd7c4b3859a8136b5
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhI:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhI
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-15_e9a9d6d3824e67a5da6384c85634358e_cryptolocker
Files
-
2024-10-15_e9a9d6d3824e67a5da6384c85634358e_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE