General

  • Target

    2024-02-04_c9c50c8d40ba966eb8f3f94e0ec110af_cryptolocker

  • Size

    34KB

  • MD5

    c9c50c8d40ba966eb8f3f94e0ec110af

  • SHA1

    dfb6e11154be1300940a80d4f8f277caff33827f

  • SHA256

    535e7995216a8563e7bdccd66f72ec126991a6259e8b35487546d1f36e94e768

  • SHA512

    90f0e470b734c130fb06476759e397f0610a9e4d04b8c322427b9fdad7cb4128e1e5de8c2eef9df5c3239fd7c55c78b3df29d9a0fc64eb9dd6051f5ab4de0aa8

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axKpM:qUmnpomddpMOtEvwDpjjaYaV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_c9c50c8d40ba966eb8f3f94e0ec110af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections