General

  • Target

    2024-05-02_e4b7c891b364c9d90ca16d92d59cf709_cryptolocker

  • Size

    39KB

  • MD5

    e4b7c891b364c9d90ca16d92d59cf709

  • SHA1

    67b87b3333c0050304ab46b02ece9bc609a76bfe

  • SHA256

    d1da02cbff7d86e033581bd4335cf8a8781c20e34fb4ff2bba11fdc3df765b51

  • SHA512

    b15552f1de568ab1d88b29d8e404023c0cfabe6e373648d680b0b4c40c23f2bce216e0c77d09cebbbe4e3141f5eb3edefb2d7a14e39331fa55ffd8fb35d1a5bf

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYa0s:qDdFJy3QMOtEvwDpjjWMl7TdN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_e4b7c891b364c9d90ca16d92d59cf709_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections