General

  • Target

    2024-04-20_05408e9957d371df5dbdb2b0835bd1a9_cryptolocker

  • Size

    38KB

  • MD5

    05408e9957d371df5dbdb2b0835bd1a9

  • SHA1

    d5226955fe57b3b75a5177fad33477ad432157bd

  • SHA256

    8b11fd6b858f89800127c600bcb6e8dd883cff009403955401d0e799b8efa404

  • SHA512

    46f3dadd3510bc7c33f1ed6c5826b1106b64d03862e67ecef5c9e599a31fdc7e99fef9b239c01c9a90b2916f5771ead9a16d5acbbadce5c299049c2035a9869b

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYF:qDdFJy3QMOtEvwDpjjWMl7TA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_05408e9957d371df5dbdb2b0835bd1a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections