General

  • Target

    2024-02-13_392768734323ff4bc194e7ba13605b95_cryptolocker

  • Size

    125KB

  • MD5

    392768734323ff4bc194e7ba13605b95

  • SHA1

    558c117375ba0f7d2e23efa2ea85589137e0dd27

  • SHA256

    68780203d21e8fca90145366b9ee9d48ccb471f0601fff64665a22a58e353f29

  • SHA512

    6d0092c64e814b261b98ef757f6ec587515ecbcf8d6d50985dff07ff8bd91c5bf3dabe7c152ecc60d7382008cdc819807829b645c2d4770a10acf510ea55e4c1

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e5:AnBdOOtEvwDpj6zT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_392768734323ff4bc194e7ba13605b95_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections