General

  • Target

    2024-05-29_c722dd3046851e971d7937220e998ef5_cryptolocker

  • Size

    40KB

  • MD5

    c722dd3046851e971d7937220e998ef5

  • SHA1

    8c58172fb15c957126cd9e4842fa331fc8343755

  • SHA256

    33ab333feb99bfe70e29646243b13d5fb6ce4dd09eded018306ce6ef37f186af

  • SHA512

    97baa85a45b10f0f8cf7b19c9b1d0d054433b5a5a4d1770f56d71a4539433d840a8e3c8c91f7fd09d8d593112904af67ffd5a04e74abacf1abeea151ccd49ea5

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYf:qDdFJy3QMOtEvwDpjjWMl7Tu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_c722dd3046851e971d7937220e998ef5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections