General

  • Target

    2024-04-20_50e30f4d3df68e59fc10312e20b68298_cryptolocker

  • Size

    71KB

  • MD5

    50e30f4d3df68e59fc10312e20b68298

  • SHA1

    dc0039b5438c92e5f6b399cc8b15b7af66da6f19

  • SHA256

    723864db4bc3d9e0ef3d5bc5a962c0b4eeee9c0c41f57fc8c9e37f35e5975239

  • SHA512

    e880f3cf253fa89ee3a121c1034dc218e66021e3eee34b916e5b5eaff0db6251cee648fc1294e6a4d91fd9c9476545fb3b5a6ed5d5d96efec0c95e661d261361

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9TR:C4Q2c94OtEvwDpj4H8z0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_50e30f4d3df68e59fc10312e20b68298_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections