General

  • Target

    2024-05-16_d10178ed6b89d5b34e8ca84b54f16ef6_cryptolocker

  • Size

    39KB

  • MD5

    d10178ed6b89d5b34e8ca84b54f16ef6

  • SHA1

    a9ad003c3eb987004feec65b84c5345028613eee

  • SHA256

    f3fce6314e7ec3785b8ce9b3adb6e8e8bcd3df8bf0e49bfea6202d3849576b78

  • SHA512

    08f96a15864d994e56553577a4fd784260022095b55c06ea942dedc93496ed54eaa733963ae40ad751328df53989eeb2cfad88973719a70aa0f2f426dcb85342

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/M8:qDdFJy3QMOtEvwDpjjWMl7Tdn/F

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_d10178ed6b89d5b34e8ca84b54f16ef6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections