General

  • Target

    2024-04-11_414fa4a5d200ba10c2377e5fe3b48cd9_cryptolocker

  • Size

    51KB

  • MD5

    414fa4a5d200ba10c2377e5fe3b48cd9

  • SHA1

    3e8e767197bcf4c7ff9a24658ab21f19e65c5b16

  • SHA256

    58896b9a5871563bd0276d27417662bada18f62c6fabc6c6969101c55535f2eb

  • SHA512

    cd02e6a464b04bbdaffc72f650c29b8a72278b041c14aa05863c81dc533d77778c808ef8f2f97e4f8965604217c98448aea84698418b4dbaaa59d86f8a0e84bd

  • SSDEEP

    1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQ0P:m4Q2ckzIOtEvwDpj4HYJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_414fa4a5d200ba10c2377e5fe3b48cd9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections