Behavioral task
behavioral1
Sample
2024-10-17_71053b9d72c0e85be537e07ed303ef87_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-17_71053b9d72c0e85be537e07ed303ef87_cryptolocker
-
Size
58KB
-
MD5
71053b9d72c0e85be537e07ed303ef87
-
SHA1
2b862c3f18b04d8ffb85e01b9aaac2666a96eac7
-
SHA256
e1c16b0f85de14c3443c74b9f2ba6e3f626b08ccfbbff85528fc972389093afa
-
SHA512
4c812e66d7832e3456b6166fefcfe95aa0271293419ea4d592a803300d5dbcdd602ac3676e32b1126529d101928b801f072323c532ed86999a9313839bea2411
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjl+x:bP9g/xtCS3Dxx0Jx
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-17_71053b9d72c0e85be537e07ed303ef87_cryptolocker
Files
-
2024-10-17_71053b9d72c0e85be537e07ed303ef87_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 17KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE