General

  • Target

    2024-04-20_52495c5436377eb49b6707f974e138f8_cryptolocker

  • Size

    37KB

  • MD5

    52495c5436377eb49b6707f974e138f8

  • SHA1

    2038c86c3c837e5f8c198baf4a76cd13986486eb

  • SHA256

    6ff816968b0e7e84579d6639e8ad0486b73bd96e6bbe15b7977f95ef2a9c0fcd

  • SHA512

    92e2aa8201122a564d794894117573ae05e5cf1c6dbf86e265f7fd5a70120bc2ed438ff1ef248d493f956211eb82dea0db63e9e7539318f2725e735678fba9b4

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYO:qDdFJy3QMOtEvwDpjjWMl7T/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_52495c5436377eb49b6707f974e138f8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections