General

  • Target

    2024-06-02_20ea7b6d43fc5141719153db14afd723_cryptolocker

  • Size

    39KB

  • MD5

    20ea7b6d43fc5141719153db14afd723

  • SHA1

    d484e4afddf9e2f6490606ed03584ae20ebef941

  • SHA256

    0bbc13ea5d468830f1cab4cd01abb0f4f954220055d225286fbb3f2437c170ff

  • SHA512

    d06e62dd36c5b265f0e865bdc92dca3e1a0e2ec4f3c804a4de510db47b17d50f506c5cda5cf1cfe8eb2ec6a218455b2f7aea0d0c82c30ebccf22cfab6ca74ce1

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYJrM:qDdFJy3QMOtEvwDpjjWMl7TKM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-02_20ea7b6d43fc5141719153db14afd723_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections