General

  • Target

    2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker

  • Size

    40KB

  • MD5

    dedb30b69a8bc6faed2474fc671d844f

  • SHA1

    c0543575deae8cb84253a094161c59c13f974f32

  • SHA256

    1a87f3db0b78596ad6749bf9a2830fb49fe8f4eb6d2891439c9362b4e2180823

  • SHA512

    a89f2126aa4233408083bec98f68d524ccc0c110b8eefd21f91a122884f71c8a0a8d2a0374eec48ec24d3398340f79a2f03f7308e83a7e0975c4846fd409859b

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYX5O:qDdFJy3QMOtEvwDpjjWMl7T5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_dedb30b69a8bc6faed2474fc671d844f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections