General

  • Target

    2024-05-22_f259ab97b8489d0aea4030093a9ec22e_cryptolocker

  • Size

    39KB

  • MD5

    f259ab97b8489d0aea4030093a9ec22e

  • SHA1

    bca1778ad71929fb4b7ef850937645e2792b0fc1

  • SHA256

    ad84020c2e9b8aefed387de67921ba8397d522b4da446b52430e0aece5581248

  • SHA512

    6f95ca13e4b2a4591a9b89bf58558f462bb9f26963a56125e1644c91efb50b841db6069536e633ad1d3050d086839d06a20dae67df51bf9c03e8c5dde2bcd345

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/F:qDdFJy3QMOtEvwDpjjWMl7TI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_f259ab97b8489d0aea4030093a9ec22e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections