General

  • Target

    2024-02-13_852f9ae104835a89596b37f1c510e43e_cryptolocker

  • Size

    101KB

  • MD5

    852f9ae104835a89596b37f1c510e43e

  • SHA1

    66a46a89552306d39e24ec4f23726ecb5bd5192a

  • SHA256

    570dc096fa6900f4b138ca22c79a70546ca4e338b2192e50a57b3f1e52db3f20

  • SHA512

    f92271f2899397badfb42c2a24905e79831a6f4180b63b5a0437fdb15bbc5246f0d9b128087af5983bf381db3d1378e5ac05276540eced7d5529289347fb4359

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6is:AnBdOOtEvwDpj6zh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_852f9ae104835a89596b37f1c510e43e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections