General

  • Target

    2024-05-29_4f9704cd275469b8a7caad3e3fff8bd8_cryptolocker

  • Size

    40KB

  • MD5

    4f9704cd275469b8a7caad3e3fff8bd8

  • SHA1

    674b157221269ec7feadd0317331eba11bcadf98

  • SHA256

    063d9ad440d8c92685e556cdaef84afef14a91d644048d66398649989545007d

  • SHA512

    989d8a18a4d8d68754ec465c19261cc65de69cacda3df8c00b4fea1a0169958de130150f9d37ac853ff1776f8837ae2b7b2dd802cccea8873eb0dc2a1ed75085

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0:qDdFJy3QMOtEvwDpjjWMl7Td+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_4f9704cd275469b8a7caad3e3fff8bd8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections