General

  • Target

    2024-06-09_455a8605f8d4a3a3660f910cffacd160_cryptolocker

  • Size

    40KB

  • MD5

    455a8605f8d4a3a3660f910cffacd160

  • SHA1

    be05774b109a52b376ea1d3b65d069e088921b66

  • SHA256

    7bbd33e0e5e1f63aa1142a0b5818843c790a530838ebfc869c9cdd4ac3085b93

  • SHA512

    beaa3e16e48a432765baf2e30a7574335998189edd157ba265e35cce1769113e02adef98047de16353811e049ca430af6ff7a432a0d67ce3a1b9dd9dd2b3d9c8

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYfFt95:qDdFJy3QMOtEvwDpjjWMl7Tq5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_455a8605f8d4a3a3660f910cffacd160_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections