General

  • Target

    2024-06-01_4b56b285bfdcb7b8cf372c5d12a49c92_cryptolocker

  • Size

    40KB

  • MD5

    4b56b285bfdcb7b8cf372c5d12a49c92

  • SHA1

    d8c35d23defe19c958a0ffaa8249d88419636424

  • SHA256

    9fd767db3a2ee7bba0dab689b48cfad849322b66727b0d6e8eb041d04394847a

  • SHA512

    fed7b16171fb8e517b82ee7ff91dd15b1ae69ce0a5c389bb26eeac5eef7c88b59435cef57069a3eedac7245a0151a29c1ca6ec6ca39d5fafd5a500c42bfc9bf7

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9+:qDdFJy3QMOtEvwDpjjWMl7Td

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_4b56b285bfdcb7b8cf372c5d12a49c92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections