General

  • Target

    2024-05-04_c7b0af13ca6d18c637fa12a65a099c97_cryptolocker

  • Size

    37KB

  • MD5

    c7b0af13ca6d18c637fa12a65a099c97

  • SHA1

    fb90d5da544acba51f34d29a639c3b39b4c974c3

  • SHA256

    fe1bc0bbf741a5fce10b871cf7cfe91563f9a175f886fd58c666819bcb9b513b

  • SHA512

    052c80d405873d125b79236cc2b3d68d148cc88c9dcb0f08f5204a1b58df29224c8cb909aa017d80cc79603ce50da6d5617a78f0411e3e0064983207ffcf55de

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3o:qUmnpomddpMOtEvwDpjjaYaQo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_c7b0af13ca6d18c637fa12a65a099c97_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections