General

  • Target

    2024-06-12_39e9f52d9ab905ae931badc3dd391b84_cryptolocker

  • Size

    39KB

  • MD5

    39e9f52d9ab905ae931badc3dd391b84

  • SHA1

    a2abb047f86d3f1b42ec20085da826be17d9f049

  • SHA256

    2d520410390aa517a3fc10ec7a0720199ca360f46f8d524a5048c7a8c5241bce

  • SHA512

    010b90d12853e7f5d7765b031bfcc568bd80f72dc504be0b1171f7617661bc8912ff39a9fb3144ae0ddcf68aa70c20bae83ed0bcde28be24959b0f119fd64954

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsYA:qDdFJy3QMOtEvwDpjjWMl7TdvA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_39e9f52d9ab905ae931badc3dd391b84_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections