General

  • Target

    2024-02-03_4e40d6f503fc9f30e42c1ddb1b000067_cryptolocker

  • Size

    101KB

  • MD5

    4e40d6f503fc9f30e42c1ddb1b000067

  • SHA1

    c6f28a68fb71eb172bd7330363175a83f2ca5700

  • SHA256

    915513eadfea4607c4e8448fd813ed6dca735cc717f2c595c33b86a83d3eaffd

  • SHA512

    52b267ea085acb024088b61ee691df7125fa6e7ff4db16ecd4f6d73a1cb16be0b79bb2930931ad6eb70f0bb5283d1423b6f11b383e968af0f341b08210788304

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6ixm:AnBdOOtEvwDpj6zB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_4e40d6f503fc9f30e42c1ddb1b000067_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections