General

  • Target

    2024-04-20_6bc5909301950dc5e91642276422faad_cryptolocker

  • Size

    38KB

  • MD5

    6bc5909301950dc5e91642276422faad

  • SHA1

    66b6eea2c429ecdc05a360ff17a570e027700dc0

  • SHA256

    93b8ea3f353601376fd58d243c714025fc26d31a3e34fedabf3cdb670849b101

  • SHA512

    74f3996fcee920580ff8fa5b29895e101c77bd1834e749f8616f0d34051bfde56213dcb9309f0564066360977e4a983142eddcdafb2a37f4bbcbabfdc6121557

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYa9:qDdFJy3QMOtEvwDpjjWMl7Td9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_6bc5909301950dc5e91642276422faad_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections