General

  • Target

    2024-02-12_14e52efa80a8b9472a00b3721084e335_cryptolocker

  • Size

    88KB

  • MD5

    14e52efa80a8b9472a00b3721084e335

  • SHA1

    39d006e780854b735cb8c8ecc416c8683e7a629d

  • SHA256

    b1fd9efc6bcfbf393a98216f0ae9d5738ec7efba835a3a291784cf4b38994b43

  • SHA512

    114b24f294995bf0eabd95891433ea651a15ad4f58dc9004cbf8e6893c47a4c643d807151e27903b9bfd164d56146c98b2d2b1b295b3c906f69da2202a978f8f

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdN:AnBdOOtEvwDpj6zL

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_14e52efa80a8b9472a00b3721084e335_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections