General

  • Target

    2024-05-23_5a7280a873f2fe1b038894297552725c_cryptolocker

  • Size

    39KB

  • MD5

    5a7280a873f2fe1b038894297552725c

  • SHA1

    d5f74c69e1cd0f1cb890fe747c6c6edc34685606

  • SHA256

    a36bbd6a7e927184e4ae39e1b62a6d224c0df6670a15e0239b363fb859ab3c24

  • SHA512

    fd337dd30c7073c575ada68941d413dbc6c5bf3309df59c2150ef4366cced9f313d291fe7d78dd0e0ffa2ce97ee590f247f0e0f4f14e85b4597365ade18a3d88

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYB:qDdFJy3QMOtEvwDpjjWMl7T8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_5a7280a873f2fe1b038894297552725c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections