General

  • Target

    2024-06-09_e527d363472fa70cfedfbb1dead10026_cryptolocker

  • Size

    40KB

  • MD5

    e527d363472fa70cfedfbb1dead10026

  • SHA1

    0cb8010f4e0c672c563789101196322d72ed4354

  • SHA256

    daa1897b012e90c84af354973d4695dde68e0e7e4de81b0f480a77fe48bb218f

  • SHA512

    d4daddd14a62f5ac4741678bd0e7d3a5aed3c86c0d969cfb86a29bdc349892465cf419d9825c72bd55ed7ff9e549e9efcdfb768ba547a69c2a7ed096967fff2e

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBF:qDdFJy3QMOtEvwDpjjWMl7TdD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_e527d363472fa70cfedfbb1dead10026_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections