General

  • Target

    2024-02-13_b737287bcb8a002715ff570fa20e39a9_cryptolocker

  • Size

    34KB

  • MD5

    b737287bcb8a002715ff570fa20e39a9

  • SHA1

    449c62d77b7a6401b5f3c26830ca02faf48fa4cb

  • SHA256

    bd3c85390472a20acf9f544fcaceb5ffa1a8f2d333595638373c917e4e237d3a

  • SHA512

    0271844e40862f3cfe2c0254e3b9ee1c26acf954c5e23ee2c90672fd254c75d21da7cb04f162d74c50c42a5217d91dff1121fb6df50940cce6df4ea4b7117144

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+3P:qUmnpomddpMOtEvwDpjjaYaWP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_b737287bcb8a002715ff570fa20e39a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections