General

  • Target

    2024-04-17_da50f9e1c3815bb2165005948c32800e_cryptolocker

  • Size

    37KB

  • MD5

    da50f9e1c3815bb2165005948c32800e

  • SHA1

    ffbd3ddab3274f89deec7ee144c7782b4e68966c

  • SHA256

    e34272ec9b5b05163506d545640ac6e7cb14966009b8c0fb4346a7e2afb9e70a

  • SHA512

    52567253d9c97cad2cfdc638b9217825b5e8e89f5baf916a5dceab52b4bd9ddfac764aaa9260ac923614f9e4af6360633108830e33755babe1d2a84f8f38b8e2

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYa2:qDdFJy3QMOtEvwDpjjWMl7Td2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_da50f9e1c3815bb2165005948c32800e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections