General

  • Target

    2024-05-20_9664e78e6812e26d3699e7f8f52b1db4_cryptolocker

  • Size

    40KB

  • MD5

    9664e78e6812e26d3699e7f8f52b1db4

  • SHA1

    3d92bd1ebfdd8003f06bd4766a2a45458b4dc72b

  • SHA256

    741d25aee09b29d3541cbe546982c42098e5044238ee7594454f746c35d82496

  • SHA512

    b3a49574969d9d690203e8285457a59326579e80a071708aeae0de3f67bec5341d8a8bbed89f032a4f01066e71c23da0361874f0999269b6e6de1d2f3eb79020

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBAc:qDdFJy3QMOtEvwDpjjWMl7TdP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_9664e78e6812e26d3699e7f8f52b1db4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections