General

  • Target

    2024-04-20_a399c2409f53746cbcf59c337a3e87c8_cryptolocker

  • Size

    36KB

  • MD5

    a399c2409f53746cbcf59c337a3e87c8

  • SHA1

    8dc3423b9c13922a190327b28f7c5909a8ee4da4

  • SHA256

    6d34e557b8128aa72f778c0a015b7aee7bb0832e49372b6861ecbc7fc3bb37a4

  • SHA512

    83fb1c8f5ef3ad2ae19e01628937a7cb7791b732fc4e67da16923f4e32f701b255b6f27eb762da89fb5bc8c7376bee38d29bd5ca3267f6e1e59282f5e3e8b6c9

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPd:qTJu9cvMOtEvwDpjppVXU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_a399c2409f53746cbcf59c337a3e87c8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections