General

  • Target

    2024-05-20_7fd78f2f7098501ebbc5f40d8ccd26fa_cryptolocker

  • Size

    39KB

  • MD5

    7fd78f2f7098501ebbc5f40d8ccd26fa

  • SHA1

    52ce4b04f3e36f4b57027198fecd33739fe3e653

  • SHA256

    58f7e109b3a38fcf70236bf6f705edb0fbbc145ebf9725c0a7e4b3ce55d8c005

  • SHA512

    747217bede9985dca2186f16256910ea89c4631a1d26f9397bff0a17509eca42b85a4cee4500673ffc3c032085a4e5cdfaa5a8d16deee21e9f9b57b53f60d89a

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/W:qDdFJy3QMOtEvwDpjjWMl7TP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_7fd78f2f7098501ebbc5f40d8ccd26fa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections