General

  • Target

    2024-02-12_a04b641a9c8c0532623c186dad29c794_cryptolocker

  • Size

    126KB

  • MD5

    a04b641a9c8c0532623c186dad29c794

  • SHA1

    217de9a838eb7dd5858b31195af0b547ca749083

  • SHA256

    65c999635a8f7ff635b8a8c976d1b461ee30d92b720a6df424e00ab32c51ea13

  • SHA512

    895908df39055303f84999a9fd6ed5369c0cd73a8c7301955c0d6a0eb184a196395ca4dcefb8e34399f1f120fb2ba43b03fb6d6d842e0db1759b9121556840a3

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ep:AnBdOOtEvwDpj6zD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_a04b641a9c8c0532623c186dad29c794_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections