General

  • Target

    2024-04-18_5552d9c93ff3f4017866733bebaca569_cryptolocker

  • Size

    38KB

  • MD5

    5552d9c93ff3f4017866733bebaca569

  • SHA1

    007c5cdf7c10f7992bafc008c77848ff1d954919

  • SHA256

    b2aeab69ae04328a88486b5b0478678a92a15bc3c230cf8a8e2e7ec179e8f560

  • SHA512

    350e73866e5622cc083de44e06d4b836b13109893f709b56c72a45705c9adeea593cba83d6eba2e5b3d90f06a8e7ae6fe70c8ba2ee6ca1f3e1cf89782e26b508

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYak:qDdFJy3QMOtEvwDpjjWMl7Tdk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_5552d9c93ff3f4017866733bebaca569_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections