General

  • Target

    2024-05-11_6f52b21c4ef9a92686a96203bec117d1_cryptolocker

  • Size

    39KB

  • MD5

    6f52b21c4ef9a92686a96203bec117d1

  • SHA1

    65e91f3eac0198b9cbd3452e154668c577d7bc22

  • SHA256

    dc3c6ba72a03cf0cc6f6f387a55b4f28bd4f4e485a2187ff40810a4a18039ab0

  • SHA512

    0c8b548686aa7aac24c2805072b940d92c5371534e5c81167c517e1f2c3ba659764bfdf3bd6c70f4f6e95da6515f3d6649ca6e53307304f816023e1c4a5709ea

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F:qDdFJy3QMOtEvwDpjjWMl7Tu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_6f52b21c4ef9a92686a96203bec117d1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections