General

  • Target

    2024-04-19_722d2476f5d92d2b2f45234e13c0f0ef_cryptolocker

  • Size

    37KB

  • MD5

    722d2476f5d92d2b2f45234e13c0f0ef

  • SHA1

    5327733dc4777f90782ebd8847d1f74659bc2991

  • SHA256

    516ff310351ee7a790ff2d349132793de55f772318212c1b345fc058c611fd9d

  • SHA512

    1963f34e7205e77bb7584d725d76d133a07585a8fcdb6f0427cba435f5737056ba938b7a6a7027dc4683f1ab810dce05f5427be9bcbd7dca25ccd599ce6b0013

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYW:qDdFJy3QMOtEvwDpjjWMl7T3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_722d2476f5d92d2b2f45234e13c0f0ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections