General

  • Target

    2024-05-21_7bbda3bb930dff738f4b510ed54412a5_cryptolocker

  • Size

    40KB

  • MD5

    7bbda3bb930dff738f4b510ed54412a5

  • SHA1

    1c9f940ffe71cf9ba37389d5910c4ede96b8d7c0

  • SHA256

    bdf41159b021a517a26667c92cf0b2b390944fc99ba559d885aa483f37b9da5d

  • SHA512

    a0d5d42ad8c98e32b9932cf4666ece5f69af05885386e3581420709998b7207d3e900dc0bf0b1bd820360c8cc7dbb145274ecc81f18a0ef7ce6535a2bf2ee281

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hE:qDdFJy3QMOtEvwDpjjWMl7Tl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_7bbda3bb930dff738f4b510ed54412a5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections