General

  • Target

    2024-06-14_14863d237ec804d676c377c6439517e6_cryptolocker

  • Size

    40KB

  • MD5

    14863d237ec804d676c377c6439517e6

  • SHA1

    5f30beb00e712420ae488554f15ef8223125e575

  • SHA256

    c8ca69ffbcea28865158bd9be38b08d770cb5ff06e7bdb7ebbfdf1144eea9820

  • SHA512

    8858139dd4275c3c1fa38b512c2088f73b5ba2e59e85f6e6134d3ccdbb07d4a65f174f0b62dcbfb7fa40a190c140403fe96614974e72233334e8ca251619b627

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYD:qDdFJy3QMOtEvwDpjjWMl7TC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-14_14863d237ec804d676c377c6439517e6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections