General

  • Target

    2024-06-12_7c2929e49308def53637e748145031ec_cryptolocker

  • Size

    40KB

  • MD5

    7c2929e49308def53637e748145031ec

  • SHA1

    dd17578083f94a533e6db5fe0ced755caa04b2d3

  • SHA256

    17bfd787d672d164dad908b5acabee39fcc8009deaac8514d0367d72af2e7d8b

  • SHA512

    9ae5d25d5bbf20fe350c8f4f3169f5b53928dd2f348cafc4488780dcbec99ff310b42bfb375805faeb4de3f7c58305f71bb7630a7ec0f84875c35dbcab51b018

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYabDb+:qDdFJy3QMOtEvwDpjjWMl7Tdq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_7c2929e49308def53637e748145031ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections