General

  • Target

    2024-04-09_6c4ccd91c5583f3a2924b95b4fa63185_cryptolocker

  • Size

    51KB

  • MD5

    6c4ccd91c5583f3a2924b95b4fa63185

  • SHA1

    5c89120477a5d09d7a34ba2df2415cb081df9505

  • SHA256

    d503d8f7e09b516180d98bc1205d6bb179bfb945dfe4933a6dd8b624be4c3768

  • SHA512

    100091b954dd65a08e69678549f413b298aa99d67ea2d6939a05568e3f812817a6f655f2eb02a9f493d51726e7887c646accb8704c224d9b173449846afa7a4e

  • SSDEEP

    1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQ0Q:m4Q2ckzIOtEvwDpj4HYS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_6c4ccd91c5583f3a2924b95b4fa63185_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections