General

  • Target

    2024-05-17_d8e9441364b3e3c13ec1f6dd3e44e23d_cryptolocker

  • Size

    40KB

  • MD5

    d8e9441364b3e3c13ec1f6dd3e44e23d

  • SHA1

    8301a27b1238f4de788a22bd44bc9f0d592a9bd5

  • SHA256

    5acdb4f984be5abace8d0c63d86d096f1c525d6aed6b89db355a5b8c2c7097c5

  • SHA512

    e8c5469bc4122ff1bfa2b4f68de7328e0dfdaa696d2b75abe9941f9e1b2ede14fb6f89167a4f748d06d1606ccbfd5fdadd86a15bcde55149240877d8e4d7e82b

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYljU:qDdFJy3QMOtEvwDpjjWMl7T6g

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_d8e9441364b3e3c13ec1f6dd3e44e23d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections