General

  • Target

    2024-06-10_663a49214289e50d6b8d5b68c9d771e3_cryptolocker

  • Size

    40KB

  • MD5

    663a49214289e50d6b8d5b68c9d771e3

  • SHA1

    8b8101208568104badfa261ca5690ac247962ca5

  • SHA256

    d03ab3319f254583b6c5fd26d193a314a5bb75115f8399afc1c4ca1e022a13c1

  • SHA512

    4baf91557d4834473816ca5157e3e355c83b4257523c0707e56f3e68a7f2a3a82f5526dfc0483081c4870ea53b58a2e8f98c2dd4a31c837134bb02d44c71d021

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F/:qDdFJy3QMOtEvwDpjjWMl7Tm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_663a49214289e50d6b8d5b68c9d771e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections