General

  • Target

    2024-02-12_dc1f84f0e1fe8f16d9919b99595a9fde_cryptolocker

  • Size

    33KB

  • MD5

    dc1f84f0e1fe8f16d9919b99595a9fde

  • SHA1

    9bfb08958bf99ba804688e88e9b1e5b134bc5ca7

  • SHA256

    8811127b738c4d84a7626a6bc3d3184f9de1fae7e7bc3d1e6870d2caed6676c1

  • SHA512

    5e4eb44e99311f05c288a3d29aac8a1b3c16f04276804a102bdd4bfc8390c95bcd8fe468a55ca0a620c5596aa05ac1953da0a29e457c43898079233931ccb4d7

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axC:qUmnpomddpMOtEvwDpjjaYaA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_dc1f84f0e1fe8f16d9919b99595a9fde_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections