General

  • Target

    2024-05-20_7f861fb384e7e35efbc6d2ffa6dcf14b_cryptolocker

  • Size

    39KB

  • MD5

    7f861fb384e7e35efbc6d2ffa6dcf14b

  • SHA1

    c35698ef5c3a495dd201cfb53496bd3611d70ff3

  • SHA256

    01da9c3be47de5b93cae882f2eb5235341f0ac5a97c6848b389de80c9b8a3fff

  • SHA512

    4bb6bab5822e348a2291de8f9e24dba2913bf1eab41e111dc1e1c8ebe5737366d9e98c60407a63e0d0da25e46377289c2b3f0b118ea7894cd40992a383f0b785

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY+:qDdFJy3QMOtEvwDpjjWMl7TX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_7f861fb384e7e35efbc6d2ffa6dcf14b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections