General

  • Target

    2024-04-23_7a0974ff5d6d911a2c73ef6242af1731_cryptolocker

  • Size

    101KB

  • MD5

    7a0974ff5d6d911a2c73ef6242af1731

  • SHA1

    5785bb0f0f35dbf9a5cc9a4dc858831cba75bd4c

  • SHA256

    f4c4fca1ce30ecc3b8f4f730e15f4e9239b5ae55319e95026c40897dda0d1d1a

  • SHA512

    da5d332db96f4c1caa11bdef67434d803fcd8baf3423a4db008eb76b98b5af4c8b4cf2f6baf95d7b7495a7271c4349b58058324a7f976c5dff1476eef3d4b42e

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBf:AnBdOOtEvwDpj6zw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_7a0974ff5d6d911a2c73ef6242af1731_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections