General

  • Target

    2024-04-30_1949c990eebad546e1a1c4ce268552ee_cryptolocker

  • Size

    38KB

  • MD5

    1949c990eebad546e1a1c4ce268552ee

  • SHA1

    626a2d9ce3ea6e06acf557c529cb102985da241b

  • SHA256

    2431e59c2cc8e49f0c55db3074a3f11db4d129ecbe1dac6d4ba99379da6fbbf2

  • SHA512

    ed9cc1d53c7ba6afa0356c6900c1bbe4647218ae4e8c3a92cc39043efcb15c382205d38ad17930699a529f51d4c488c292f820068020f17632a41d7eaeb2dbab

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/y:qDdFJy3QMOtEvwDpjjWMl7Tdn/y

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_1949c990eebad546e1a1c4ce268552ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections