General

  • Target

    2024-05-29_fabbb36ebbe39a85718d0ca94c339930_cryptolocker

  • Size

    40KB

  • MD5

    fabbb36ebbe39a85718d0ca94c339930

  • SHA1

    f668728b587ed56aaa49b040b0492c45ecae4074

  • SHA256

    b6b10179a3cee523f66f6a51d8d14ad485253c60a7bd5158323136aaf037152f

  • SHA512

    84b71021019e6529f21d1358c2a8b8d42fbd9383bdada9789e1cdfe0bd24e270065e229fad1678e9a532f7a582cecea18b1f401b2d4af2752dd560ad3ef8e07c

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBAz:qDdFJy3QMOtEvwDpjjWMl7Tdg

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_fabbb36ebbe39a85718d0ca94c339930_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections