General

  • Target

    2024-02-13_d317fab1c3e3f10008d26f24b6d589cf_cryptolocker

  • Size

    101KB

  • MD5

    d317fab1c3e3f10008d26f24b6d589cf

  • SHA1

    06448c852d4b3a38e699ca7606cfb4f126a4f985

  • SHA256

    9ed570a88bbae54dddf13446993252e086f20e9abac436c8741e0bbdf0dc9d89

  • SHA512

    43445655a876f2c70635d7aaa97a6dd22afba9f3be01b570efd300b10f0715c87cbcf24294ff141e16ff132276b39480337ac2f22a55107b1b684106407b7171

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6ixH7:AnBdOOtEvwDpj6z4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_d317fab1c3e3f10008d26f24b6d589cf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections