General

  • Target

    2024-06-17_998fe851769e139d8df779cfb543461f_cryptolocker

  • Size

    40KB

  • MD5

    998fe851769e139d8df779cfb543461f

  • SHA1

    1109a8dcb0877be1b8936046b263a56027e234ba

  • SHA256

    fd2b30fe3fcb0f67cc46978310c59514f7602e3724b0db32cce6cad1b9357d02

  • SHA512

    f0ec2dc78a60dd65cbf90dcb52b8a082646f978a28791481ecd9736aa8e8f46ab08b7e0922e7ee39bc37bd4d1dd279359162a3e3badcb0633ea80b20ab52ffcf

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/Nt:qDdFJy3QMOtEvwDpjjWMl7Tdn/n

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-17_998fe851769e139d8df779cfb543461f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections