General

  • Target

    2024-04-24_d4f52675b668cb1d550f897d7dbe9dc9_cryptolocker

  • Size

    38KB

  • MD5

    d4f52675b668cb1d550f897d7dbe9dc9

  • SHA1

    7a3043815553514c3fcaa75a6c4e98aeb451b922

  • SHA256

    47558292041ce919362086fa06acec60ba14561632e19dd07d65cdf981924696

  • SHA512

    defb06216de0b1f76ba1652ceb8254e4018681d07547ab89da3f77dbb8fae2419f0b04f1dd4103456f93654a8c2147daa18f871d4a4fd8d44c9569a1aba9a903

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9j:qDdFJy3QMOtEvwDpjjWMl7TE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_d4f52675b668cb1d550f897d7dbe9dc9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections