General

  • Target

    2024-04-30_705f0e4d346b5414128be7151aa8438e_cryptolocker

  • Size

    38KB

  • MD5

    705f0e4d346b5414128be7151aa8438e

  • SHA1

    87e94f383d3200dcb5c174c0383907f25b096b27

  • SHA256

    4a3c0e1f5a3f40b187ad1569e363b78ef37ba06cf6856f49d85f62d01362a60e

  • SHA512

    37525978b1db3f310faf5a780196625886d550800e61891bdf94a5a410fbe4708da51d1aa0eba2a7e43727227a109a0fb872033c8cb958cc0072c5e9774b3731

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYanz:qDdFJy3QMOtEvwDpjjWMl7Tdnz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_705f0e4d346b5414128be7151aa8438e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections