General

  • Target

    2024-06-15_39ef07a93662964e72d71dd58f82c19d_cryptolocker

  • Size

    40KB

  • MD5

    39ef07a93662964e72d71dd58f82c19d

  • SHA1

    9e5c010cbbc58458f8828eb313471f5608b893f1

  • SHA256

    61189795967fb32632db9fa990c85ddb48e2fedcc8a42bf23746aabc0748bfdf

  • SHA512

    6f5a2d1828d9c352542d81921ee57a3071ec0506e56e503055f5ef1ef13ab67e40f54223ff41ed054994776d219dd98e2e02a788910820df5305386af7e37590

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITY9F2:qDdFJy3QMOtEvwDpjjWMl7Tv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-15_39ef07a93662964e72d71dd58f82c19d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections