General

  • Target

    2024-04-29_8b7f59cf173aa9d075cfe3228f8a888f_cryptolocker

  • Size

    38KB

  • MD5

    8b7f59cf173aa9d075cfe3228f8a888f

  • SHA1

    de966c87da44790d3d7abcbdd6d677c3dc260813

  • SHA256

    bf692534b9f6acba5ad8343d2e071d03b9d97b3f9ea2f20185b02421027317ef

  • SHA512

    12b63a7b3101c82a13169938da6b48365d94430ced872d3ad334b35f228fa757328a09c4bdd651a64cee0ca28fd203ac5159f711c9ab28361e4a70e172a4276e

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9Y:qDdFJy3QMOtEvwDpjjWMl7T3

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_8b7f59cf173aa9d075cfe3228f8a888f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections