General

  • Target

    2024-05-10_392e6da59f7b5038e8a0c12b96377581_cryptolocker

  • Size

    39KB

  • MD5

    392e6da59f7b5038e8a0c12b96377581

  • SHA1

    3e099c9f8f888a24f6678399da78da351c02f2c3

  • SHA256

    fedc81fb6def0aa98a4a7aa1e8af26c65142874cc55870c4be5c70a0d593ec1f

  • SHA512

    5e4f466f5bd8a4a5f358122473adec89ac7c0d444dd3e1582a14a4a6af9c4e2cef1442e98af926f16d99137f329d1e220bbe3d4b04462c93c7d52f7163a9dea0

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBa:qDdFJy3QMOtEvwDpjjWMl7Tdo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_392e6da59f7b5038e8a0c12b96377581_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections