General

  • Target

    2024-05-14_e47a1de103b68552400bd8a29f4490f9_cryptolocker

  • Size

    37KB

  • MD5

    e47a1de103b68552400bd8a29f4490f9

  • SHA1

    530debfa2db92af09bc8f974d713d28f4d4f513c

  • SHA256

    9b0d45a09459b0693fe423ab0bda5eea39565661415d845f41e5d659b08b86e0

  • SHA512

    8f5bb9a6d86ed9373e0ee388f53d48493e1e40c430e3e441eb92c946550fb496e391f37c3b9430e629c9117f97dc22a83d04dab979ea2361ad88bc474b4ba237

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3n:qUmnpomddpMOtEvwDpjjaYaQn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_e47a1de103b68552400bd8a29f4490f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections