General

  • Target

    2024-04-17_f39b65b408bd62f8d4e156b3deadbd48_cryptolocker

  • Size

    37KB

  • MD5

    f39b65b408bd62f8d4e156b3deadbd48

  • SHA1

    51161e208f09d2e507effdc65571feb5fca5ace8

  • SHA256

    a32e924db515c2a0ddddd6d96174d2f2e2cc41a24aacbc325ebbd52ff2c5f8dc

  • SHA512

    aa48a711cf8898e4c9611c04540104ac65c9ad369f50cf4931700787263f708361889dbb0a12f25ebd11e915d81beef58d4b0cda936353214a190ce70d041eeb

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITsV:qDdFJy3QMOtEvwDpjjWMl7TsV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_f39b65b408bd62f8d4e156b3deadbd48_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections