General

  • Target

    2024-04-16_7a3595a6916569c178b3574184a9efa8_cryptolocker

  • Size

    69KB

  • MD5

    7a3595a6916569c178b3574184a9efa8

  • SHA1

    ab50226e9dfd470edbc4b9339aa53f1508efec48

  • SHA256

    955799bfb18de6d08998f4b0d2d4cccd18d45468cb1bd69d0708347a3cc0ecb2

  • SHA512

    f5f0f32213b1d3192fa2762ba0eb3fcf438a8c0b7668f755fb5d387d8a908eac8876a50a5ace2e8d14c1003357eeb0a67d70f3d9a3ca3a1ec164c8486494b427

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9B:C4Q2c94OtEvwDpj4H8zw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_7a3595a6916569c178b3574184a9efa8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections