General

  • Target

    2024-02-04_a934d951ce792089b66567b39fc448c9_cryptolocker

  • Size

    125KB

  • MD5

    a934d951ce792089b66567b39fc448c9

  • SHA1

    d77c71f98f8f65f0c8728c4d19fc03b562b4bd17

  • SHA256

    312286dff5d3482677f7d913d61933c3e9b34f4e90b5b3272e22a993915513a4

  • SHA512

    8c2eeaa3de25f16a208bde102d9d6e1ec6279a4948d914c99ec9ef45fabc762b53acf23e7cb9229202d19150aa2c0f24fc7eed8e794006df745e26bf43528e61

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIb:AnBdOOtEvwDpj6zS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_a934d951ce792089b66567b39fc448c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections