General

  • Target

    2024-05-22_72904f181cb429f99dd76839b1733951_cryptolocker

  • Size

    40KB

  • MD5

    72904f181cb429f99dd76839b1733951

  • SHA1

    d195ab016698a425a8ab8b27d2712cb8ca01f4da

  • SHA256

    f6d8e26d3ff8ad52aef419b2121da7b55f43e62793d01b263217563a6584dd57

  • SHA512

    7556a536a1618f4a553d97b49d9253ee28a5558f6ff9965dfd71a82214e7efeb6c5722e830022fa5840effeb0d0ad1cba8081d7d27331bd4bc771bdb1d5601e0

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYr:qDdFJy3QMOtEvwDpjjWMl7TK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_72904f181cb429f99dd76839b1733951_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections