General

  • Target

    2024-06-04_d210a1b98b19843e030f6fecc4a1a424_cryptolocker

  • Size

    40KB

  • MD5

    d210a1b98b19843e030f6fecc4a1a424

  • SHA1

    7008a289445cac9797364a5a6812dd06db84b168

  • SHA256

    88319c1710190852503f109628a341ca278dc8e73ef332734a00d5b07e0f226e

  • SHA512

    149820678f8e0060254962f50ac0e928dbe18fb17cd4c38cb18b5809c3cd4b85b3b89fc380badf44077dd9ffe8bc8ad435a7ed71e286c50e978fc223717947c0

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBc4Sz:qDdFJy3QMOtEvwDpjjWMl7Tdsz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_d210a1b98b19843e030f6fecc4a1a424_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections