General

  • Target

    2024-06-04_4932ffc55cb6c3469685bd5a9e481edc_cryptolocker

  • Size

    89KB

  • MD5

    4932ffc55cb6c3469685bd5a9e481edc

  • SHA1

    efe0dba80a338ed8ee3407e4c1773936cd62c364

  • SHA256

    8ba9332cb4038abd67690114a2262e6a661d1f77b1dd5dc34f3d2938fc886266

  • SHA512

    404e9bcaa736490ace1c50ecdee866e9020099d6dc04b6f47dcfce9d7de9c0e92e31492780de988f648ed62663798e8fda680efe847218bb684990096bf2f039

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIODh:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_4932ffc55cb6c3469685bd5a9e481edc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections