General

  • Target

    2024-02-13_9f917e80db614d38174958cc055bd37d_cryptolocker

  • Size

    99KB

  • MD5

    9f917e80db614d38174958cc055bd37d

  • SHA1

    07f9bd1991f5ae2b16c3c78b2013f532a3213b67

  • SHA256

    252177c560a833ad852f448d1c07904a9a2a96963e700614313b8f56593208f4

  • SHA512

    78fc211abc4cabbea670c19ccee15bfe98a366f3b03396b38ee914bab3bccb793323b3a3bf5496606ddfbb37283b856d3763087cfba39167778f2c3e48caf6f3

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeo:AnBdOOtEvwDpj6zx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_9f917e80db614d38174958cc055bd37d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections