General

  • Target

    2024-05-23_34128900a64639214b067dfafa9a116c_cryptolocker

  • Size

    39KB

  • MD5

    34128900a64639214b067dfafa9a116c

  • SHA1

    77e294d25e328299744e5669717b2c34f2e6e3fa

  • SHA256

    e14b6d16b5abfea2340041ddb5c07f7044594a3b3b475d56fbacafbad4a684d0

  • SHA512

    1413486fafe093535b2fbcd6e9fda2a22185a33bfdbc84c234cab06146c43ee1132a2b6e1dfcf3667bf52ad4022799b5b2eca5800be25d72ce5bd5040902b30a

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYfFtx:qDdFJy3QMOtEvwDpjjWMl7Tk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_34128900a64639214b067dfafa9a116c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections