General

  • Target

    2024-05-12_ca658a88730778c85cf8aedf10bb6f49_cryptolocker

  • Size

    39KB

  • MD5

    ca658a88730778c85cf8aedf10bb6f49

  • SHA1

    64e42c95b96930c3c67162ac4542369838c13674

  • SHA256

    b9692b89ddfde63aee821b46392effd4c9370ee2f581f5ecfce25f34ae883078

  • SHA512

    01a53f3845f6b8437b7695d901c7f1c5498756e34b84356f637aff99b27c2f0c668ab66ca852afa1928ea5cfdd89c7961afa27d9fcd50e3cb959241e2bd09164

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBf:qDdFJy3QMOtEvwDpjjWMl7TdJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_ca658a88730778c85cf8aedf10bb6f49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections