General

  • Target

    2024-03-28_7300dd875820ce59cbc9b4f429e69bfa_cryptolocker

  • Size

    35KB

  • MD5

    7300dd875820ce59cbc9b4f429e69bfa

  • SHA1

    a734181dcb1d2663fee0585d877af1f079e2c5f4

  • SHA256

    3da4e601e9a46ec3bf131a1a5c4a3277baa22e5da7023228e54b9d29f268658e

  • SHA512

    70a4a9c660edd4d5be971df3add74c02bf67465595a29c85706e76e067cc3495c75fb122d235c6f5846d981b80725bb3fb296e06d545df9e20c00a56e0416f72

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/Dpk5:qDdFJy3QMOtEvwDpjjWMl+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_7300dd875820ce59cbc9b4f429e69bfa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections