General

  • Target

    2024-02-13_41ec43f811d1ef17c1c1e5f171a4a050_cryptolocker

  • Size

    87KB

  • MD5

    41ec43f811d1ef17c1c1e5f171a4a050

  • SHA1

    a648aefc07a05d72672497aa5ac09f156b68896e

  • SHA256

    1203cb3597b0248ea8178ba13bdd1cf849555dcb74fb097ac490e93055fe1737

  • SHA512

    f3ebb3976134d471f4cc35f9646377a74356431bc32d5e507b566102be7783ecf16b17836952d7b6ba6aae20a58c030fce39409d75b823c1b6401bf1d9b47707

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIB9:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgU

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_41ec43f811d1ef17c1c1e5f171a4a050_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections