General

  • Target

    2024-04-05_40c14a868521990039d3379926499728_cryptolocker

  • Size

    36KB

  • MD5

    40c14a868521990039d3379926499728

  • SHA1

    2d38c52f3bbc28c4e8f16298e01181513f1cd649

  • SHA256

    63d24b17329a0cae6525b45718c386ba32d7af340888d99b619841f9bde7f87b

  • SHA512

    03b2c2a78183fc4fd9680494f89ed0f08eef2fb232d839c5cfcf90172278c2b3aac942f026d4a7c6ef2dd9b862ff83d776775def6e68a3d18f0336e5236651e6

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkY:qDdFJy3QMOtEvwDpjjWMlb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_40c14a868521990039d3379926499728_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections