General

  • Target

    2024-06-11_b4a15b92dc49e8e948697f83b9ea1a0c_cryptolocker

  • Size

    39KB

  • MD5

    b4a15b92dc49e8e948697f83b9ea1a0c

  • SHA1

    cbaf26b87b3da6c4150964e389919b7531ae8483

  • SHA256

    9d48511bfa1952c5b979b4a9b9f392c9bdc1137cb36c4d6ed3a873d03f454765

  • SHA512

    c6b6db64a26836997761201e64b94d2979059bd42f5bc25fbca4009162480ba544987ed3786d20c76ae7a7cc7a7d1a23099bb2c679adbf465a6b54435c1a2b63

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRJ:qTJu9cvMOtEvwDpjppVXzRJ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_b4a15b92dc49e8e948697f83b9ea1a0c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections