General

  • Target

    2024-06-05_f4ea08e86880b1a705f0e52186337f9a_cryptolocker

  • Size

    40KB

  • MD5

    f4ea08e86880b1a705f0e52186337f9a

  • SHA1

    64a156df29c74d3e66df85bf83d686c2c86348cf

  • SHA256

    ebf3475963274bac34ee800d9c2a450eb704c5d2174b6a674232095169b0e9ce

  • SHA512

    d8a98a4d33a3a139e1e45001fa5c64b3eb850a3e0fb52442fbb43f0c1f2c1dbd2bf3e7f80dcc72ccde45a49dd45a799b255d2309d54ce463835b1887cd429e8e

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYZ:qDdFJy3QMOtEvwDpjjWMl7T8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_f4ea08e86880b1a705f0e52186337f9a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections