General

  • Target

    2024-06-12_ee5fdfa84c3ce94e631700e81e508a58_cryptolocker

  • Size

    40KB

  • MD5

    ee5fdfa84c3ce94e631700e81e508a58

  • SHA1

    7d5d85bc1a13e5296fcfbc18a8247253e0c9a879

  • SHA256

    9f9dbac87a27c1284f1b4d40b8ba3b70556038b07d591c19c601edcc5de0454d

  • SHA512

    398a75749d5c00e7b38119c62b739d4646c264f160d2c55321967c263b25113a79895b28fa1d8fe594145041a489fcc2ca2255a8581b90626fd4722a5a08c8ac

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYabDbi:qDdFJy3QMOtEvwDpjjWMl7Td2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_ee5fdfa84c3ce94e631700e81e508a58_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections