General

  • Target

    2024-05-30_96c0044c59217bdfdca4d65c617d9ee7_cryptolocker

  • Size

    38KB

  • MD5

    96c0044c59217bdfdca4d65c617d9ee7

  • SHA1

    d766a8d61803347279fcc82c1113daec31aadee2

  • SHA256

    20a3039c7c0156720cc93e826946f59e204f05669c9adec5a772ac57c4d1eced

  • SHA512

    03abc6d6a6ce406ae6438b47b2bcb290f36cdd172bec6486ebe1b5e845215d0c448948bdacd9148104fc4a935f861d8abd0407eb8f3a58abf516e69a691b8759

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3Da:qUmnpomddpMOtEvwDpjjaYaQ2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_96c0044c59217bdfdca4d65c617d9ee7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections