General

  • Target

    2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker

  • Size

    40KB

  • MD5

    370869683aad44f22e0c1ee5ea67f94d

  • SHA1

    8bb868f0f3a43e2d43b067d79a6a1e7f87f8558b

  • SHA256

    26d2fd70cd4dfa0469a99ff59ae344390e02cec6b7154dccdd45ef786fa08ab4

  • SHA512

    b867217817f2466cb38c17903307af5ac170e626e949e6003be15fece40f1e1301d319b4dad331fdc6074e769a1e82075a1e7178b8f7a62cc09ec24818f88b77

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYn:qDdFJy3QMOtEvwDpjjWMl7Tm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_370869683aad44f22e0c1ee5ea67f94d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections