General

  • Target

    2024-04-10_d45fcd1314fd38e3e29a767e4daa5e83_cryptolocker

  • Size

    37KB

  • MD5

    d45fcd1314fd38e3e29a767e4daa5e83

  • SHA1

    af249fcec8059be4eae84accd643f8973ce5caf2

  • SHA256

    6c59165ce5e05eb58726a982e825637f90306f6d022c554b5f66777235480efb

  • SHA512

    94fa36faff4dbbc3b042aa250cd5abb88f2fc3ee482f7eaf86f31687a436571fb7cce2e5fd2ca6b5e8cf22a6259e2726e50094fe6c8b01ac82ba84fd5b214c10

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITsu:qDdFJy3QMOtEvwDpjjWMl7Tsu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_d45fcd1314fd38e3e29a767e4daa5e83_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections