General

  • Target

    2024-04-28_dd4d17d9ea5a35227c09b3e284375ef0_cryptolocker

  • Size

    130KB

  • MD5

    dd4d17d9ea5a35227c09b3e284375ef0

  • SHA1

    cc859b2cf18694389cb0827c5e20c94a6fe1f86a

  • SHA256

    1199a949441444ce0390a187ee2474c17d7557fe439356208aa5bd9c07ff36ad

  • SHA512

    ed628acac0cabb58018b94844ec07fcc90c56add15eaa7a5e0a58d850c83cf065b9f2411ea0344a875e5281e8a0824da205e43f880604cca602760bbd3a9af7c

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI7j:AnBdOOtEvwDpj6zm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_dd4d17d9ea5a35227c09b3e284375ef0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections