General

  • Target

    2024-05-20_4f83e86848a96422bb892a9750b0bc3c_cryptolocker

  • Size

    39KB

  • MD5

    4f83e86848a96422bb892a9750b0bc3c

  • SHA1

    e82cf4401bef6af312e8f68f37413b7516298e67

  • SHA256

    4626202903b3758a4a0af2bd273e8dd240a81f55497afd587cef0384cfd9ad97

  • SHA512

    0878f67725b9aada670213d11449843dbe8bcdd1a401546a2d87ff37f34124b0b1d4b65f86c5490c268e54d5e38661dd228901a38130359cf2ef4165e374b8b2

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYA:qDdFJy3QMOtEvwDpjjWMl7Tt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_4f83e86848a96422bb892a9750b0bc3c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections