General

  • Target

    2024-05-29_750c42a8bf20cbb778ff266fb1ef7be2_cryptolocker

  • Size

    39KB

  • MD5

    750c42a8bf20cbb778ff266fb1ef7be2

  • SHA1

    e6207ae13fc9607257b56ef14c718daed357b7ee

  • SHA256

    d8c63a884b38916c3312fc68a7bbee37850427ab518d208b9fc65775d85e5f3a

  • SHA512

    76bf0795e7e0b1e4e871733966ef18dc803376bfcef4711aa76a22cce1bc8293bbffa300d9098bf8820e37816e3f12e2202d923e96c95cd0cbe3d5f0415a3886

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F7:qDdFJy3QMOtEvwDpjjWMl7Ti

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_750c42a8bf20cbb778ff266fb1ef7be2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections