General

  • Target

    2024-05-02_4aed3f6645fedc07890773669018e345_cryptolocker

  • Size

    39KB

  • MD5

    4aed3f6645fedc07890773669018e345

  • SHA1

    c886aa92f5dbdb0ec807ebac4758a61ce660336c

  • SHA256

    a81c87620583b22b01f6be6758f97fd15cb0593c3111d8d912c897e8264c83a2

  • SHA512

    4801abf33a16d90039d63cd1f4846caad60f89b5898662de7e1a0732cd7a94ff7644ac312452371d76d598e322de6a28ce6544c67878bf0b1133215df6282fd1

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaS:qDdFJy3QMOtEvwDpjjWMl7TdS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_4aed3f6645fedc07890773669018e345_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections