General

  • Target

    2024-04-17_040c0202101019f4abc6d0ccc4a5a0ed_cryptolocker

  • Size

    38KB

  • MD5

    040c0202101019f4abc6d0ccc4a5a0ed

  • SHA1

    dc101b12e18810f8fd4a1de66911bbe51fc28479

  • SHA256

    d2147a3855db5571181f3bfd60bc8d3dc001afe58860f28422bf8a24c6160e39

  • SHA512

    aa21d776381fa75fd6bc0c9c6aa71e33ac150fdae31cf95f4d239af451959d6024f1e4060eec3aca58281701ad41e3b67a288f743514aa8b3301b6cc424be42a

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaW:qDdFJy3QMOtEvwDpjjWMl7TdW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_040c0202101019f4abc6d0ccc4a5a0ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections