General

  • Target

    2024-02-13_65e38f4f50d512770fc6db514f4a9b04_cryptolocker

  • Size

    87KB

  • MD5

    65e38f4f50d512770fc6db514f4a9b04

  • SHA1

    eb9f266dae1ae49e8def4e28ca19a355e07fb125

  • SHA256

    1d948fee40ca4e52e5d3a8669b7c0a34e689534916bb322067b0b8a8e80e39fb

  • SHA512

    35c28f64a308518833180270371cd9e95aed408cf02c63bb2712e0a4b1ac018182cde11620221396fa2e65fa77fc08cbf278ad86cfe464dfb7c43e28394dc58f

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgSn:AnBdOOtEvwDpj6zO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_65e38f4f50d512770fc6db514f4a9b04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections