General

  • Target

    2024-05-20_6e7c23f37e79209f4bbaf454db2c26ae_cryptolocker

  • Size

    39KB

  • MD5

    6e7c23f37e79209f4bbaf454db2c26ae

  • SHA1

    701fe6c6a3c879533fa6d08c0c02cc7f8faeb391

  • SHA256

    1382e31765c84f2a08a410d39a2a86991c85950076462da4143f9e5f5987e4d4

  • SHA512

    a3029d3c64be58edc4692db0282ac51d36d01471757b9ddec5d67f2c8c7c120a853c2be77bf1d550fce1f2771e68fa6fca6849c6a2365416b562fc73cd5fba78

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsG:qDdFJy3QMOtEvwDpjjWMl7TdV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_6e7c23f37e79209f4bbaf454db2c26ae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections