General

  • Target

    2024-05-31_33d9cb386ae42f4bb985db3914da2123_cryptolocker

  • Size

    40KB

  • MD5

    33d9cb386ae42f4bb985db3914da2123

  • SHA1

    0a2bd8de164c5241ecf2952e4f65b7ff0c9f84c3

  • SHA256

    0000ab29c97d6d2826546e8de54c28ee9ece97883162058bd813b74cb725d2e7

  • SHA512

    685b9e5dda58820186dbf1c801a8d85b5717ca31505a0f9a22cea128bd02b3f237d723b2d77257cb0a7bde1506723c79295fb95d1a19ef7f3966c4d8f1b083ec

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYlye:qDdFJy3QMOtEvwDpjjWMl7TIt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_33d9cb386ae42f4bb985db3914da2123_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections