General

  • Target

    2024-04-17_569106924948d06951183a2f14f55af4_cryptolocker

  • Size

    37KB

  • MD5

    569106924948d06951183a2f14f55af4

  • SHA1

    f5564ba4611fae3f2cdf43df0e25b2cb29660097

  • SHA256

    b8299110250e33a025fd8d90ccfa88e643a8fc6bd5a2dc919a3a7aff32b0efe1

  • SHA512

    f7e96b283dd73312ca9d098a71734469ab2862459a868fa4c9162df842d423daa9906d6be7ce22e35dce74f7c7fff1590e11d8445608cfe73d4c358a0add02b3

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYm:qDdFJy3QMOtEvwDpjjWMl7Tv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_569106924948d06951183a2f14f55af4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections