General

  • Target

    2024-06-14_d362e9bfd432666fce0d8c789cad7c3d_cryptolocker

  • Size

    39KB

  • MD5

    d362e9bfd432666fce0d8c789cad7c3d

  • SHA1

    0c649106d5e611ca6124b53476b5d03b80207f0f

  • SHA256

    a3fb58007932cfb825db74b4f4d58206a30724c50a2c1395c03749d35755e683

  • SHA512

    b208008e7e9d629646b511254eff29e56bef5b0d527375e364698b0578aebc1b1eccf189c70b33f24cac094382a9877ae6a610a2b4149f7928b0b4294a7568fb

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRio:qTJu9cvMOtEvwDpjppVXzRx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_d362e9bfd432666fce0d8c789cad7c3d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections