General

  • Target

    2024-06-17_049ca389b107ae55ca5e699b31a33b4f_cryptolocker

  • Size

    39KB

  • MD5

    049ca389b107ae55ca5e699b31a33b4f

  • SHA1

    18ea77c97371faf84fd1247f6218cea62703a0cc

  • SHA256

    58cae9656463dbd876cdd5281e7c4daac42b7f2b974c879e19809438487beea1

  • SHA512

    d8522eb423853126f17c07fd1bda595c4813fa22bd69f19e472c53fd82e49e3ee16515b6607b498ddbaff68f3a2e116de78ff25915005933d952a9ce0c57acb6

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRij:qTJu9cvMOtEvwDpjppVXzRm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-17_049ca389b107ae55ca5e699b31a33b4f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections