General

  • Target

    2024-02-13_45de1235c483f0148a1372d260192a5d_cryptolocker

  • Size

    34KB

  • MD5

    45de1235c483f0148a1372d260192a5d

  • SHA1

    72790d8d1535fa3275e8147053c2a82881e1b2e8

  • SHA256

    656ddec411bf9ec2b019bdf94c1df4c6a9ca319a59e75702ba4fd42f1522f591

  • SHA512

    1783e125d87373f4aaa96628f70e18ae2539c1af5e0f9cf02099c0bd99d9c2c4c6a023f49e1895583100099c305c1e41c8a413f0989557219a270766ebcf45c7

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+G:qUmnpomddpMOtEvwDpjjaYan

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_45de1235c483f0148a1372d260192a5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections