General

  • Target

    2024-06-04_4fc3b6a49b7471b38d3a03d88deaff94_cryptolocker

  • Size

    39KB

  • MD5

    4fc3b6a49b7471b38d3a03d88deaff94

  • SHA1

    5ca8040d6ce0a4227ad8b40fbbdd48d4ac02c830

  • SHA256

    9ba8173fa2ed10a1f96000083708ef6ca121cd6e7d2edd17e2a72a171a7852df

  • SHA512

    60234afd0ff96a4352c05833d03459af849884f19e2be919bc2721c1f0eea2f5b337a84d1c28d9510d536120dd1f17345334e8769ef6d3d5a3d851f9020a20a8

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRv:qTJu9cvMOtEvwDpjppVXzRv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_4fc3b6a49b7471b38d3a03d88deaff94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections