General

  • Target

    2024-05-11_3367bb7040c16e6945a48f1b247e909e_cryptolocker

  • Size

    38KB

  • MD5

    3367bb7040c16e6945a48f1b247e909e

  • SHA1

    569b9520cf4e13217c70243b46a2b6c97b1a88f0

  • SHA256

    daedb1ca5991602e46a9ced1172d8a0c0719288c564d670b8fd1220f9bab5b8b

  • SHA512

    da312b88aff32e4ce644bef127e9fef5043763e327d9d8d22a1e402aa8287ecff6602d5af58a7b25c2c734640bdcc2b811b20d28e06fc61501f029f47966293b

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB+:qDdFJy3QMOtEvwDpjjWMl7TdU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_3367bb7040c16e6945a48f1b247e909e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections