Behavioral task
behavioral1
Sample
2025-03-21_b35283ccdd867905443e8970b6557eef_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2025-03-21_b35283ccdd867905443e8970b6557eef_cryptolocker
-
Size
20KB
-
MD5
b35283ccdd867905443e8970b6557eef
-
SHA1
a9734c0d5c9f8cf74a11d6c3c5414df1cea67221
-
SHA256
d25f06530424d4f26135325c02c2f890d51b14171bb8eaff0c146e6004c22228
-
SHA512
965c57ef9b1f0dbc865479d02dd722a5beedd518597a9d5f451c687aa98c9f01ad1d6cf4bad918db97e54f2be871256e5dd10f8f314942f6f128e63f375cfe58
-
SSDEEP
384:xG8OlX7EG+2LEjwg8SD6SSFYDTujQAf+hoGaQwbqqTn:xGFD1L/g9BSFYe0iv1Tn
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-21_b35283ccdd867905443e8970b6557eef_cryptolocker
Files
-
2025-03-21_b35283ccdd867905443e8970b6557eef_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE