General

  • Target

    2024-06-13_c154c35866d930739858475369526a15_cryptolocker

  • Size

    40KB

  • MD5

    c154c35866d930739858475369526a15

  • SHA1

    d647c69551d66ad730795c88e8dcbd2cdb561278

  • SHA256

    50bb2c7a982e8bb2f8b795da2e4db4d24c300ba4ac1819fa0f189d918b7943e8

  • SHA512

    f09d1ead9526b6897fa3f23e09f36a247895b9b2f5d66b58dc1cc26f3bc4f5733fb327ec5f617e19624bc7485b80e787cbec965d8ebed62ba081b8c1beb01fde

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9hff:qDdFJy3QMOtEvwDpjjWMl7T8f

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_c154c35866d930739858475369526a15_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections