General

  • Target

    2024-04-09_333a664caa4b7b6536a09df04029235e_cryptolocker

  • Size

    37KB

  • MD5

    333a664caa4b7b6536a09df04029235e

  • SHA1

    8fea43a7d043d8568d75a133a7ffe684476db691

  • SHA256

    d2d364d0352dfa8c63b506d72bc0109f77605bc8627f6156a823d04e45349384

  • SHA512

    968fb5955087b6d4fd58745e33ff67881824dcd93414c61462072c6c58c650cf3e910cc2b18d31b3b420fb5804d6106013224f7d0d455df70798380a04e6fd0c

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT1:qDdFJy3QMOtEvwDpjjWMl7T1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_333a664caa4b7b6536a09df04029235e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections