General

  • Target

    2024-05-29_d6e269bfa1010c7823aa39308beb1dac_cryptolocker

  • Size

    39KB

  • MD5

    d6e269bfa1010c7823aa39308beb1dac

  • SHA1

    641f4282721294f3bbe866b907293dc259d3933b

  • SHA256

    92cb1f828347548d4351110ed137886ae87212cbc9bd03dd8d8c0480979eb3c5

  • SHA512

    fcbcf78ddfe613ec6bb7de7fc614ec1af13d8972351c1ca9a3f6836cc0376ad8fc91e774d3ab33e088b5476515eacada759c2f1b51d539bfbd1ef7f700f124c4

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY95:qDdFJy3QMOtEvwDpjjWMl7Ta

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_d6e269bfa1010c7823aa39308beb1dac_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections