General

  • Target

    2024-06-13_d83e37c55d371e6ea706b8e4bdfecffd_cryptolocker

  • Size

    40KB

  • MD5

    d83e37c55d371e6ea706b8e4bdfecffd

  • SHA1

    d1482ed3535b8eb75866c6f4a047707263154628

  • SHA256

    66cc2de86590513c6d463fe23aa235c3c6ec9e2c5ec058e81668de9d570c0515

  • SHA512

    4a9175116dbe79fd26dea76dbe57fec097a98747b526153e1383f681d4d7080a31ae7439c0aef7f96607d3d95dea852f95e94092de959a4ac52823f59242b428

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY/p:qDdFJy3QMOtEvwDpjjWMl7T0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_d83e37c55d371e6ea706b8e4bdfecffd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections