General

  • Target

    2024-03-15_7a309fae2aafb18a35ba314f25aefc44_cryptolocker

  • Size

    35KB

  • MD5

    7a309fae2aafb18a35ba314f25aefc44

  • SHA1

    515d7246d35e2b163f7114401795bafc49cab20c

  • SHA256

    0487c9025a8803329d28e5e78d44c7f9a69e9ee169b60415136ca17eac71902f

  • SHA512

    db1d139ce6ee5eda83f330bc94ee8501b0175c412c70356bf25d47c44510c52a90dee9b2f9d6d07a9491c2fbcbe9e45f201e72e573f72afef4c041dd9b39c3ed

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+m:qUmnpomddpMOtEvwDpjjaYaf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_7a309fae2aafb18a35ba314f25aefc44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections