General

  • Target

    2024-06-12_4185095e5ab94719a93794703189a8f7_cryptolocker

  • Size

    40KB

  • MD5

    4185095e5ab94719a93794703189a8f7

  • SHA1

    10f56bb90c694f52b33f941606e9b816d15a4f08

  • SHA256

    a61968fe5f600b91b0d80d81c8abaf9602fba9b93d8193da818ce29c8c3e442b

  • SHA512

    740a5e983c985c196c87f90d8af4143d21f24bf3cff22337bb993bd48b1e7ce7895029dbbeca22763a4318d655d0ef36f6a89b8002537daeab324702c69dda99

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYb:qDdFJy3QMOtEvwDpjjWMl7Ti

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_4185095e5ab94719a93794703189a8f7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections