General

  • Target

    2024-04-22_21a5b280c4f51eeab3d1346cad0c6447_cryptolocker

  • Size

    38KB

  • MD5

    21a5b280c4f51eeab3d1346cad0c6447

  • SHA1

    efc952f6cacc57a079953f276e7450a7aa3b93cf

  • SHA256

    ac8c7f7ef229c6353de794aa18bf09835a8367935069c0aa1432c8866d1deba3

  • SHA512

    e1c5559f4e2d7c1541a725d40be5728b8f8eadbe6d0ca33487a340c86913da42da35ca6c6cd7f6d8415dd8af3bfc8034fab4ffcfce49015e13fcd0500f8d718f

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9T:qDdFJy3QMOtEvwDpjjWMl7Tk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_21a5b280c4f51eeab3d1346cad0c6447_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections