General

  • Target

    2024-06-05_39833638d3d83325fb59065e70cc9f1e_cryptolocker

  • Size

    40KB

  • MD5

    39833638d3d83325fb59065e70cc9f1e

  • SHA1

    f48b1ea23977c999b0c13367a21dbf25e50416e0

  • SHA256

    de020ec4c4803ca15abb19ad47ec2dd10c1027a257e893cecd201bc1b60773dd

  • SHA512

    42074b3fa5b9e158080e07a761495ce35547d10166ad4adee1911838eb181b7cfee8cf24b8614a7b2eb20673f6c633892885407bd73ee09a882c2622f7931b08

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/M9/:qDdFJy3QMOtEvwDpjjWMl7Tdn/k

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_39833638d3d83325fb59065e70cc9f1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections