General

  • Target

    2024-05-29_cb44779f8ae1af12f757e290154082a3_cryptolocker

  • Size

    40KB

  • MD5

    cb44779f8ae1af12f757e290154082a3

  • SHA1

    177a122c29b9ccffa6973fef48c9c0887535fcf3

  • SHA256

    77eaee4f51e2e845337dbf2027f1c2739caec77fb984fb6f7a3c0549dd53c83c

  • SHA512

    04c75c16a3b5372903f40a1110a25d8396bf69a6fe036a17d39f6e5f06ed35df34bdff61977196edf67ba92b6b2d121d20bdc0319ad03ad9d70ab474da1402f2

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/0W:qDdFJy3QMOtEvwDpjjWMl7Ty

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_cb44779f8ae1af12f757e290154082a3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections