General

  • Target

    2024-04-24_870542e8e7f2f40d530e4846f5b4c599_cryptolocker

  • Size

    70KB

  • MD5

    870542e8e7f2f40d530e4846f5b4c599

  • SHA1

    a1ef874f6755a006405d637f2d8dc2ae9b4d1185

  • SHA256

    cc0e600490f9d81b7fe58250a985aa304cbf4c1b2a5b1430ca780d7cbbb39cbd

  • SHA512

    485411e4ffc4bdae0898dc51343e7383d73c54e5db8f9f803066cb114ffee748067e3ec3ad6e1ddf474a19e7f5e1bb8bc42a0526e1991bacaa07f1da2c4532df

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9L:C4Q2c94OtEvwDpj4H8zm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_870542e8e7f2f40d530e4846f5b4c599_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections