General

  • Target

    2024-05-15_49f26521687bcd42ab951967ce20cdef_cryptolocker

  • Size

    70KB

  • MD5

    49f26521687bcd42ab951967ce20cdef

  • SHA1

    10db5fe42ea589d582170befccfc73dfa12e0f1b

  • SHA256

    35ee8fa8ec3fd9657b109dd4b235082176d6db8c6f3dfa923fcf517c91e40713

  • SHA512

    7c820285ff7f5166d96ca9e93153c92f0243a19751cd7600981dc1494de222c9d6e7978b674cd1fcda43f24ad8e90b99ff357b71c7beef8f82b84fdebef863c7

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9H7:C4Q2c94OtEvwDpj4H8zO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_49f26521687bcd42ab951967ce20cdef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections