General

  • Target

    2024-05-12_eda0f69644f0cc5b82a92d0f86648f9c_cryptolocker

  • Size

    39KB

  • MD5

    eda0f69644f0cc5b82a92d0f86648f9c

  • SHA1

    170cc74b2099da87a1096b171e3197e1bd214a1d

  • SHA256

    c62a44b8b69687a69da464a1d7c955a1c29cde9443ecc04029b9ac9aaa177324

  • SHA512

    5528b00cacae7cb8848b604652da703ece3779a226ce8d97a22085d3af208ff5215833e775208bc142546612326ad462fcd195520cad575b9a087dfea1a02b94

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBx:qDdFJy3QMOtEvwDpjjWMl7TdX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_eda0f69644f0cc5b82a92d0f86648f9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections