General

  • Target

    2024-05-01_f573241926419339b968c9100fac109d_cryptolocker

  • Size

    38KB

  • MD5

    f573241926419339b968c9100fac109d

  • SHA1

    204634d04f2ba848ffe52224890b1b5682ca1b1f

  • SHA256

    c13e4e4816cf8a9c98a3a5a78e71089e7487d14d6a547324dabfa169cff75448

  • SHA512

    825d201de3bdb6fc8762003e324722f24f1640564a0d5df80148b5799c6a4ad2c8756ab86a20d2e2745ec27fd242d2bd471dd657bef3fb6fbbcbe3e6f598b5f8

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9U:qDdFJy3QMOtEvwDpjjWMl7Tr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-01_f573241926419339b968c9100fac109d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections