General

  • Target

    2024-05-11_4ba41e3bb059e72570f2f499b20fb83e_cryptolocker

  • Size

    68KB

  • MD5

    4ba41e3bb059e72570f2f499b20fb83e

  • SHA1

    b03033f1d9b27a1f9ee5c22ec3ca2d2a255fcb17

  • SHA256

    8d27584b0bf4941f5c95897ece5b40def484a5318d470cc59390da1f77140742

  • SHA512

    869510c78df7a082868c4e34625959ed8bb2401e21ad258140b754d20bc8cad706ae9f155b4b1de5e7de00e52e7df31db9878de6e89da3de9b4dd6c2acdd8eb3

  • SSDEEP

    768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1PF:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_4ba41e3bb059e72570f2f499b20fb83e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections