General

  • Target

    2024-06-12_779f1e3bf5e43b3db3c6f61273ee299c_cryptolocker

  • Size

    40KB

  • MD5

    779f1e3bf5e43b3db3c6f61273ee299c

  • SHA1

    7023227bf3b6dd3584992ca0e15bf78048542259

  • SHA256

    a395ab7ae4a99292704ce57cb9ca3c69ede51ca6c30ee79b8232a22fbe6d3c7f

  • SHA512

    4798da1199907aec4de1b713fc2dc4902d1eb5ee163f866ddec60b2569601c433a48e9f87bdf810bc991d704e1ad49e66fec3369d402ecde0595a849f7694e49

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY84:qDdFJy3QMOtEvwDpjjWMl7Tp4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_779f1e3bf5e43b3db3c6f61273ee299c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections