General

  • Target

    2024-04-24_44a7ad05583ea1e74eb0f782ac59439a_cryptolocker

  • Size

    38KB

  • MD5

    44a7ad05583ea1e74eb0f782ac59439a

  • SHA1

    2101d17e459274c8fef243febd082f5a7bc39924

  • SHA256

    192d46ed1caa6872b1fb14f6e53f94657536b2687c680056b846bb1cca6a469d

  • SHA512

    b5adcc4aff8f459fa3fb112d9a2fa96f1b94f110109d627e7ac6dca9f4f40caf32205ff6ad9aa0180e303ba557c640c611457cea38b0a5af4cf64dceebaf73ff

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYT:qDdFJy3QMOtEvwDpjjWMl7Ty

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_44a7ad05583ea1e74eb0f782ac59439a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections