General

  • Target

    2024-05-29_380b25625d5a95f3e339d7da72750c9e_cryptolocker

  • Size

    40KB

  • MD5

    380b25625d5a95f3e339d7da72750c9e

  • SHA1

    61aed1867059c653697eecdf6b28b937565fc86c

  • SHA256

    0175debbf73e229a558342e41f5a44c78e433b5bbaa6684673d61cd45afb21ba

  • SHA512

    03e74cc5b179dad1a9e4f2fb2ddd8898ec6381ce31da4c777a96f4169683bfb603108db303fea36f3f0c0dc5ed168a467c623719ba5364870ea354219d3bbb4c

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB1:qDdFJy3QMOtEvwDpjjWMl7Tdz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_380b25625d5a95f3e339d7da72750c9e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections