General

  • Target

    2024-02-14_c07ea65f526411be7e42b6dfc2358a52_cryptolocker

  • Size

    126KB

  • MD5

    c07ea65f526411be7e42b6dfc2358a52

  • SHA1

    76ff56bba88177c2d04a385ddce3ddfd8032219e

  • SHA256

    f5ba8d9c0da5290d454af2f3299cab8118ee7cb4d509cf5b98f7f84f6f4b0c36

  • SHA512

    4a65b20afdd5b2faa5293433cd1ef514d963241afd4eca32f485623aed4f6a602a2feee0e32279bd5fa17d25227f7550af5f211a11b5147ed252256317094ad8

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1emz:AnBdOOtEvwDpj6zW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_c07ea65f526411be7e42b6dfc2358a52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections