General

  • Target

    2024-06-11_6388dde7953a2297cf5787945a917794_cryptolocker

  • Size

    75KB

  • MD5

    6388dde7953a2297cf5787945a917794

  • SHA1

    a7d43d03f7931cce99ab3d2a5c9465e9df6a6be0

  • SHA256

    be31bd32dbce7509eed9c6f036e14a217fad6808acec3d2b585dfd800e6b71db

  • SHA512

    b6645a5d8ecc7d082b3aabcb3269c23973000b4c03e7c61a932b89a797cf3497fa96dab16b0e9f0f03fb02c0b78d7bf6753df83d95ff0848b4b7831db2365919

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9Vg:C4Q2c94OtEvwDpj4H8zz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_6388dde7953a2297cf5787945a917794_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections