General

  • Target

    2024-06-03_12ed424ffeb9e2b01eb07555c3e5248a_cryptolocker

  • Size

    40KB

  • MD5

    12ed424ffeb9e2b01eb07555c3e5248a

  • SHA1

    b520ad23cfda0f420b64bab0d131b59183f179f2

  • SHA256

    ee8f5f511280657e573a9c6fc02529cfb563e836c302b54f8e6a33dc0fac0ca9

  • SHA512

    0ef5966d7d6d1496d829878866b2c0ce4973f4a993183816c1cb51799865fafd671fed533158ca9aa043b19713764541a585295ec1d8e3555f006ce7ed1bd064

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYo7:qDdFJy3QMOtEvwDpjjWMl7Tl7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_12ed424ffeb9e2b01eb07555c3e5248a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections