General

  • Target

    2024-06-15_ae2cb4a279b746b50be8142afdb64a89_cryptolocker

  • Size

    40KB

  • MD5

    ae2cb4a279b746b50be8142afdb64a89

  • SHA1

    c34ce0ec95da4a7b9bfc00bf9f99c354fa0c3776

  • SHA256

    bb134903c5c82495532e915c4e39572962454d435c282b838135cce887e04054

  • SHA512

    03701bc2b668dad30b91a64adc0a896db8d6e3b70d73b7acbc4c60f5c23365800876c995bd1da0d3b5ed30760d90ed66c82e7db519ff8667a29db05a5819fd65

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB0u:qDdFJy3QMOtEvwDpjjWMl7TdCu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-15_ae2cb4a279b746b50be8142afdb64a89_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections