General

  • Target

    2024-01-23_ed522d6842569ae1953e818a22207e9c_cryptolocker

  • Size

    34KB

  • MD5

    ed522d6842569ae1953e818a22207e9c

  • SHA1

    b2748c5c6c0f6fa1dedb634b1f300b02f78f2663

  • SHA256

    3a49dfd10b81d57ddc86974939c1d231bd902b246de8b6ab9aec367fa7eab342

  • SHA512

    16e7f360cbe85bb6785bd9ea33d3b1a263aa39d95388b21e31bd1e5e3ad30224b6c21d426cd66ebc6e79696f479973f8eb0fb5cb40ba2cb7b9c4269934833684

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax1:qUmnpomddpMOtEvwDpjjaYaz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_ed522d6842569ae1953e818a22207e9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections