General

  • Target

    2024-05-12_7e667f5f6b405e92a47de7a237011530_cryptolocker

  • Size

    39KB

  • MD5

    7e667f5f6b405e92a47de7a237011530

  • SHA1

    3e9794a1178d45a0496bb8b0bfd06ea3189523dd

  • SHA256

    44203c7ba511d71c8c0c88af3a05b02b8b185a3d8a16ff70244bc3ff89278723

  • SHA512

    632f7afa06297bec115550574d55b73c91ba15444607c10bd7d780f794602dc614f8bdc46f3e743c841ffbab602866e657306c6376c83797824480bd33fc74a5

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBZ:qDdFJy3QMOtEvwDpjjWMl7Tdv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_7e667f5f6b405e92a47de7a237011530_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections