General

  • Target

    2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker

  • Size

    40KB

  • MD5

    ea4f0041cefd4976bd564a79105aab73

  • SHA1

    25da0d5574e571423cbd7994607d8336d6accdf6

  • SHA256

    be72a30b42bb3cb1c5f8c4512530c0f64aa5bb2826d5219e84c6137d6c6dd521

  • SHA512

    90cfea2f628d150cae1bf0e8f0e330365b82cdf282061ef1bd5840281fccde2b2f44989eb1662018aa81c2d871e53a4a22a642a71dbe4923ee19c134325d11dd

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gi:qDdFJy3QMOtEvwDpjjWMl7TdCgi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_ea4f0041cefd4976bd564a79105aab73_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections