General

  • Target

    2024-02-12_f133d6a5e3b70666a7a8120b21244d9b_cryptolocker

  • Size

    128KB

  • MD5

    f133d6a5e3b70666a7a8120b21244d9b

  • SHA1

    ea342cff70b3f21567aeb47d427e9b62ebb32a30

  • SHA256

    4007b14c225bcdf6cb953faf52d41262f79cd491a82406debce18d769be32c14

  • SHA512

    00a076536761c4f3563d5d789ea882af2a6195c56d68496b86ae9363eca8031cf8dedf953c3261c1b738fd8584580a0ae72346e4cb2cf36f4bfe7c5528830469

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ejUx:AnBdOOtEvwDpj6z6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_f133d6a5e3b70666a7a8120b21244d9b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections