General

  • Target

    2024-06-19_5276c52e94bc8390c9fbe2bc9c31d322_cryptolocker

  • Size

    35KB

  • MD5

    5276c52e94bc8390c9fbe2bc9c31d322

  • SHA1

    474f960eead04853efd25bc732fce77312e609b1

  • SHA256

    e7cf89eaae01e5446107d4e23be0b262fa48e6f5d05b8af69f56a366446977ab

  • SHA512

    ba6a8383d3212cd791f8c9989a03ad146661b4a694af15009323f27182626988172b5f3bbaa089123780a01cee63184bd918d4e65f0a85d3e8a76abee44c4dd6

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITs:qDdFJy3QMOtEvwDpjjWMl7Ts

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-19_5276c52e94bc8390c9fbe2bc9c31d322_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections