General

  • Target

    2024-02-04_e6634eeb5fce773d86d1d812c8f519a9_cryptolocker

  • Size

    128KB

  • MD5

    e6634eeb5fce773d86d1d812c8f519a9

  • SHA1

    65aaf2e889cd874df68ce3b871f65ab7f3cb1c3d

  • SHA256

    f1f6bf43f9f13cb629ee723a676c565d200ea03a56741e9f2c0c124eb1728d5b

  • SHA512

    eb9703fc4c19523a53fcfff46165bc65437f437505dab6b6033ea3129e03fdef2766865685f2d311ea0abdae1e71826fcee8c690d2052218c2f7495e3f4653a1

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e/4uu:AnBdOOtEvwDpj6zG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_e6634eeb5fce773d86d1d812c8f519a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections