General

  • Target

    2024-06-19_4f1c66d1cba622a63664b067b1c0062b_cryptolocker

  • Size

    35KB

  • MD5

    4f1c66d1cba622a63664b067b1c0062b

  • SHA1

    cacb8cbfaf35a43d70ca8d90c380eebe24c6530a

  • SHA256

    81830fa8c028666082403e2497d5f0ab4f646f7525828f3098d505d6a7d0302f

  • SHA512

    6ee9df2c53f18fc33138ad34e472f73e4dee2f26b02b500f7c738380b747b65bf01579cddd53c1b7999ec362d93e8741c5cb6b060822c6ac84dc52adbb02e325

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITy5:qDdFJy3QMOtEvwDpjjWMl7Ty5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-19_4f1c66d1cba622a63664b067b1c0062b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections