General

  • Target

    2024-04-20_364631cd345a4e72f058750b940299a4_cryptolocker

  • Size

    86KB

  • MD5

    364631cd345a4e72f058750b940299a4

  • SHA1

    01f4c7177bd6be601138ba444d27d162e5d972f3

  • SHA256

    97839994703a86eb7b8cf0280f0d9c33c371fcea910ca007cb3cdd0381a10f6b

  • SHA512

    9e7f6df690d65442762fdc0af462cabd746a746648e1a3761a283699d86a435084a74770ea79ba11979d9ffeb11be2c6bd997d29fbb119d71be524fd5ac4778f

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIOD1:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_364631cd345a4e72f058750b940299a4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections