General

  • Target

    2024-04-24_a749c50bc5ec7e397472d67c6852a11b_cryptolocker

  • Size

    38KB

  • MD5

    a749c50bc5ec7e397472d67c6852a11b

  • SHA1

    cf0a66f358e6ba3a4b57e08ede2614620f7b7753

  • SHA256

    b71cf45622111d911f91a8e6ecc00e54fa2c7ec6c79f348b4a453f788b65ef1c

  • SHA512

    1141eb2058c183e659497d962a59fc196c859417e750890ee22a2de755a625d29b86c6a102e4c668bd4f6e7f626c068f88c19b10433a08f0ecfa8b55d93de791

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB+:qDdFJy3QMOtEvwDpjjWMl7Tdk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_a749c50bc5ec7e397472d67c6852a11b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections