General

  • Target

    2024-05-09_451ca2f8500cc38e3bb52f9ac7ad6ea1_cryptolocker

  • Size

    38KB

  • MD5

    451ca2f8500cc38e3bb52f9ac7ad6ea1

  • SHA1

    d844a8f7363ba9c5e9945165e9e15de29967ebac

  • SHA256

    08dc2e3a3770c1dd99f08028298a89a5001551a6bbb9a489469d602997e5d69a

  • SHA512

    82f069e7471582c2fd378689280dc2d4e20c1f2c66bf3f227b38cb92eec0eba2315848c31387fd3851b36f0ad5ce1362a79e2a2cb36dce7e3bebf84b1e826149

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYz:qDdFJy3QMOtEvwDpjjWMl7T6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_451ca2f8500cc38e3bb52f9ac7ad6ea1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections