General

  • Target

    2024-06-03_490f37e9544d59f442a80de8372da444_cryptolocker

  • Size

    40KB

  • MD5

    490f37e9544d59f442a80de8372da444

  • SHA1

    a639aac25768d4ffc88d370133abf605321f62a1

  • SHA256

    16928ab029033caca666454ca054a4dfb050c5666c42416451e1f079e9f363a0

  • SHA512

    59b556816824bb315ea037261e5599f1f274da4591070ddb93b56b7cf5872d1799b7bf98b41313f669a990d3e9dfa06c934afdcd7aa1e40cbe9678f4b2c6369a

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYPQ:qDdFJy3QMOtEvwDpjjWMl7T9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_490f37e9544d59f442a80de8372da444_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections