General

  • Target

    2024-05-17_bedad6fe2a00ca28621780a5a2f49497_cryptolocker

  • Size

    38KB

  • MD5

    bedad6fe2a00ca28621780a5a2f49497

  • SHA1

    7db507db45ddb80dd91bff8f861332c1eec22768

  • SHA256

    bb2c2d666c7f75513c7e1ca6b5c0e7d95e4216ecb2897e3b74d9ba941376bf88

  • SHA512

    a6a5bbf75c0d8c2b7ae5f668b62b1d7f1b08f19f60525f3b72ef83306f59567981ecdedf04e894ee821ac641d32cc04c1334f30558a01c08a0373a3795e23f95

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3Dw:qUmnpomddpMOtEvwDpjjaYaQk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_bedad6fe2a00ca28621780a5a2f49497_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections