General

  • Target

    2024-05-10_d6604eddb82e58339ca3d44453d7cdf0_cryptolocker

  • Size

    39KB

  • MD5

    d6604eddb82e58339ca3d44453d7cdf0

  • SHA1

    1d04a3aaacce03b828c34a6256e4f01d39fd7bc6

  • SHA256

    254a350d41c7dac59db089ad94139c8b63c8b6a935912f58ac4e0226c7d2da4b

  • SHA512

    21303df9986513c9394c354a701f1aacf401d8429d44c8994a8afc2f2eb2b0933b44bf06076e5167c95ea2c1ffeace14b60fa452f19ebec261c9b2cb974292ba

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB+:qDdFJy3QMOtEvwDpjjWMl7Td0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_d6604eddb82e58339ca3d44453d7cdf0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections