General

  • Target

    2024-06-04_e77983105e11d79d2c1ba999377cd63e_cryptolocker

  • Size

    41KB

  • MD5

    e77983105e11d79d2c1ba999377cd63e

  • SHA1

    9daa6b1427aae3d3410fa62b8e44c37e60004dfc

  • SHA256

    95a011e93de3e00c1c66dd6133999d86bba88d2ff06e9cafbaafe26fa8d22f18

  • SHA512

    b30fe2218669d792a8a0939174e37aaaafa11e1b4dad8aca815f2de3d3236b1b3cf4da29f2b57dc65398d75f808ee5ba36965ad8ab5037fa1d9ef59080668e36

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0gUS:qDdFJy3QMOtEvwDpjjWMl7TdCgUS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_e77983105e11d79d2c1ba999377cd63e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections