General

  • Target

    2024-05-26_b641d4bd0540e0bf56892759775bf9c8_cryptolocker

  • Size

    40KB

  • MD5

    b641d4bd0540e0bf56892759775bf9c8

  • SHA1

    86470cc5cc831b5a1f05a6a2888a355a04aa9143

  • SHA256

    106ad76e477770953bd9a4d90c4ff14c35df16b8bf9179388bf067722e08902e

  • SHA512

    20906826a29d7dada49efe879b57dd0227dda2def035e3b89258a7ef897ff5bc430bc9e915f020e743b800ee2f6bc3e66a70c8813ade49348c88b2cbd2055888

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYq:qDdFJy3QMOtEvwDpjjWMl7Tb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-26_b641d4bd0540e0bf56892759775bf9c8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections