General

  • Target

    2024-04-24_7fc45ea3901d73a31d1782194d171190_cryptolocker

  • Size

    50KB

  • MD5

    7fc45ea3901d73a31d1782194d171190

  • SHA1

    2981b0285a598f7d459cfd704db5e77c087e352a

  • SHA256

    d5157cbdeb84159e5ac17e4ed975ef37a0ac06b991b5c7e9d06a45cfa8cdb1f1

  • SHA512

    c688c13e2d7e25125586e6eb43377e2b22fde6b4dd8353b3daab4b7209eefcfd8a79bd4b9d21ba49dc3dd1c9be0831d829f9e3710eecc8378fefb814ecbaf933

  • SSDEEP

    1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLR:m4Q2ckzIOtEvwDpj4HYh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_7fc45ea3901d73a31d1782194d171190_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections