General

  • Target

    2024-05-30_7fcb663172c328c722b61ac571f3dbb1_cryptolocker

  • Size

    40KB

  • MD5

    7fcb663172c328c722b61ac571f3dbb1

  • SHA1

    6c5c577b9cbaef9c739648fef7573c6a86a3117a

  • SHA256

    116af68db7938e3b9f00548318d64fd2a4e54c320474e0d1167f101e544e0f52

  • SHA512

    48be85f5774a22f0aab54a71d171cadb4751c47c8499b4d4b5b84fe921cf406963b995ad23e68ebb900d59ef37d202e0c337e06871dbf9838ce151b4937be3db

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYXn:qDdFJy3QMOtEvwDpjjWMl7Te

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_7fcb663172c328c722b61ac571f3dbb1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections