General

  • Target

    2024-06-14_2cf65b8e55209705841b80b29a5b3333_cryptolocker

  • Size

    40KB

  • MD5

    2cf65b8e55209705841b80b29a5b3333

  • SHA1

    a9940e7eec80160bbe80371ebe8fca93d7dad6c5

  • SHA256

    c8b5a5410a876aa1dc025f95728328c26161c79e40f7d47ebf670c82ce053f0e

  • SHA512

    d4805836a4522a7e5664ace8a29592dcc24b983b7781df1176ac82a2544afefd61fdb813fb86caf98849d05e7de7cd0f0e26985d76031955499083e4eac1ccd6

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYabDbn:qDdFJy3QMOtEvwDpjjWMl7Tdb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_2cf65b8e55209705841b80b29a5b3333_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections