General

  • Target

    2024-05-21_4f690d9eb140e2a9353e8556fdf96ac0_cryptolocker

  • Size

    40KB

  • MD5

    4f690d9eb140e2a9353e8556fdf96ac0

  • SHA1

    198f7faae27308e2b3c92479f6863191c0c914c2

  • SHA256

    c6da73ab2e259e78e695ee8c82bf1521cc1cf07ee9307ede5059fabf83339e92

  • SHA512

    4750497a6c438b627adaa8981f44bb7c2ac67a4f86caa77677659faec1cbb23cb6654a9ee0225dda52601c2dbdad04f9b2557b94d03fb8e81bf6aa6f1d69a425

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBcI:qDdFJy3QMOtEvwDpjjWMl7TdX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_4f690d9eb140e2a9353e8556fdf96ac0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections