General

  • Target

    2024-06-10_6ec8ca6bbf90fcc781d55293baba4843_cryptolocker

  • Size

    40KB

  • MD5

    6ec8ca6bbf90fcc781d55293baba4843

  • SHA1

    4daa2da2031c89a60f45e74dfb2d3f17782e8a50

  • SHA256

    bb6b21026b8a6fe0c0c57b4e0dfadedd8a7d7d1539836c027f4f1ed2ce763c09

  • SHA512

    aa91e51995752f8ba2c97bd040608c79845fbe8ae9fc149f2d48093908f194e44675bf5cecff94f602eee777890361cf57e5d7206ff5e6081e0c60dabb8fe410

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY6:qDdFJy3QMOtEvwDpjjWMl7TT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_6ec8ca6bbf90fcc781d55293baba4843_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections