General

  • Target

    2024-04-05_7c4b7f672b67966ac61a9a8a14cceeee_cryptolocker

  • Size

    36KB

  • MD5

    7c4b7f672b67966ac61a9a8a14cceeee

  • SHA1

    682590440083943873dc41a0fd668d978ef8245a

  • SHA256

    124f80228a7f63b0c1411822d84422d54f2765075ba546f0afd888cab2bf4d0b

  • SHA512

    d4a1b0afa987eef16fd0fb208a1eb6fe4fa22a250c93568aeb4de4616d03d3d8db922fbae38e974d96ee0351d69fe9f48aba0a89cf7b03952083d7c308e2cbc0

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITgL:qDdFJy3QMOtEvwDpjjWMl7TgL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_7c4b7f672b67966ac61a9a8a14cceeee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections