General

  • Target

    2024-04-25_4d66ccb77282320c1e4019d5e4a7894f_cryptolocker

  • Size

    38KB

  • MD5

    4d66ccb77282320c1e4019d5e4a7894f

  • SHA1

    2fdba3d5017ca08f796670023ec25879ff7e5e65

  • SHA256

    357e787fbc8e4bdc0a9df28bbfd6902c30d83e6ad6dce3bdd42a32a7b33bfb6c

  • SHA512

    844dc08960cf2503d30b4dfb47f12f26780aced8b86e0676ee585f79fbeac726509a36fe9987e5dd9853626bc224a8399954add26929615f9cb301739aceeba7

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaF:qDdFJy3QMOtEvwDpjjWMl7TdF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_4d66ccb77282320c1e4019d5e4a7894f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections