General

  • Target

    2024-05-10_d6bd3f10d1277c47ca563c58b6475f52_cryptolocker

  • Size

    38KB

  • MD5

    d6bd3f10d1277c47ca563c58b6475f52

  • SHA1

    1c618e2335639a888abf91b805f3c579b168dde8

  • SHA256

    5854ad475a5eadaf8a08c75a992410f8fa7f7c5354af20feb98521aceceec1e9

  • SHA512

    4c5e52f0104dd8d71d849dcaacc9fc05cff2881953caa4ff131a4ff0bc2a0717e1be262d7ca87d441998b93a466161e11cbb94a9c3101799e1efb795f5e25b27

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYant:qDdFJy3QMOtEvwDpjjWMl7Tdnt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_d6bd3f10d1277c47ca563c58b6475f52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections