General

  • Target

    2024-04-20_0ad2902e75b0dfa2bef1a579e0866a53_cryptolocker

  • Size

    36KB

  • MD5

    0ad2902e75b0dfa2bef1a579e0866a53

  • SHA1

    d4b1cc402ee7e3940600537829fb5f30c62649b4

  • SHA256

    e83c5118e281ec4b5d8853d72e82ed05e853aa79d4638202a45d5b504f00390b

  • SHA512

    4986b77b3d24a0f6f1eaf557739660daef75cff84bd1e8e2bc526f07da6a98c4113b9cdafb0b6981ba0afd51d331002282744ffcc6215f30110f61431c63532c

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWX:qTJu9cvMOtEvwDpjppVXzX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_0ad2902e75b0dfa2bef1a579e0866a53_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections