General

  • Target

    2024-06-09_7b55924aab1e938b8f5bcb80f7dac442_cryptolocker

  • Size

    70KB

  • MD5

    7b55924aab1e938b8f5bcb80f7dac442

  • SHA1

    c65d827baf8b6931102bc120cca89f63867e74b6

  • SHA256

    2756bba4f1cd17968f5d4c09a2a542e8fa1b0853ea1e93e25c0f781ea7090a8a

  • SHA512

    f8a334624f65b73c421aa0affdf705e2e3e54afccb0aaa3eabe26ea62c41c730261a869db7c3b3a3105e433a56373e4f914a59ef9aea5f5bb311470da965d54c

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9y:C4Q2c94OtEvwDpj4H8zn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_7b55924aab1e938b8f5bcb80f7dac442_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections