General

  • Target

    2024-05-27_68b5cd3faf16c734b5cb1039ebe7d23d_cryptolocker

  • Size

    40KB

  • MD5

    68b5cd3faf16c734b5cb1039ebe7d23d

  • SHA1

    8429dbcd275bfc772f459bfe258d0c2604cb110c

  • SHA256

    1917bc41c21bb8b985f7ee724e5362e86034f557ea935306c6e54aff6f3a3a49

  • SHA512

    3c86c639d90a9d5fa8fb4c9885863f58be4c12c2c2edec47ddfe9a04b0702d961c4f8e639e283591ba9301e39c160c961dd3a03ee37e63342658530e5891fed5

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/0Y:qDdFJy3QMOtEvwDpjjWMl7TU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-27_68b5cd3faf16c734b5cb1039ebe7d23d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections