General

  • Target

    2024-02-04_07654c4f9b7f588743d45b44ba542a08_cryptolocker

  • Size

    98KB

  • MD5

    07654c4f9b7f588743d45b44ba542a08

  • SHA1

    2e4817e5e5c3017cda43f7ed699e5a55751f4647

  • SHA256

    6b4e544dc527c43b5c8b8a6cbe7a21887e6fa7d019b9d036f34fcc7c5b54a384

  • SHA512

    25241bc5a653f4c95b8b0c6a2c657cd02d50950ea06d3fc8bebf843c8973092fa010dee832029431a1e75ee3a0342f31d0c28109de5c1808e596337b24eb0ca7

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPf:AnBdOOtEvwDpj6zd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_07654c4f9b7f588743d45b44ba542a08_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections