General

  • Target

    2024-05-16_ed910a2e3f8f514fe613ae355ca771e7_cryptolocker

  • Size

    40KB

  • MD5

    ed910a2e3f8f514fe613ae355ca771e7

  • SHA1

    fdbb69087726563bcbd0a156d071deb21ca67354

  • SHA256

    48e221699833e53728b375d3f5e5dc3f35b3c11f49d9b307df5154791a3601ec

  • SHA512

    968fee1e9e686f1281107bbef960784d2e30b1310f460a15c886febaa2f4965086e73e02bfcf79d43424b036902a8f3e1e4536e15b29c7d8dac2015461226253

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYakp:qDdFJy3QMOtEvwDpjjWMl7Tdkp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_ed910a2e3f8f514fe613ae355ca771e7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections