General

  • Target

    2024-05-25_e7f16406bd743e34be75429cc8e6bec9_cryptolocker

  • Size

    40KB

  • MD5

    e7f16406bd743e34be75429cc8e6bec9

  • SHA1

    411bca177396fab2fba5b61d689f9ece226000c6

  • SHA256

    d55a96b67ac8f24197aa7be4d714f694de001c81ebbcbb966c275eebb5970ab2

  • SHA512

    3e0afc1513930186732baaba5e1601b8a0fc2441a0b900aee69c8af498e684597dcbddd3cafe8f04d0319ad1c0b624c6560d9434966838b134ac3e2ca1818370

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBcp:qDdFJy3QMOtEvwDpjjWMl7Tda

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-25_e7f16406bd743e34be75429cc8e6bec9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections