General

  • Target

    2024-05-29_3b388ecd6c4911505333359ddd4d298c_cryptolocker

  • Size

    95KB

  • MD5

    3b388ecd6c4911505333359ddd4d298c

  • SHA1

    9d21444d935059a90211f63d6a6ce6fd59cf7e4a

  • SHA256

    072b1101971a3640ef5e5907312701963b39913b4a53a968dde8f6a1dc7950cd

  • SHA512

    622a2ca4d0bc9ee3899700667eaee9a2f3f3ecdcba7cfd11c8b81f1f4eea58389c0a74c8601230a30e4c13dfd887a16c6e10a9ac694c84303b2d936c407d8c7d

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0+P:AnBdOOtEvwDpj6zk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_3b388ecd6c4911505333359ddd4d298c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections