General

  • Target

    2024-02-14_9e85b69490d6d0659326285336fc0c7e_cryptolocker

  • Size

    101KB

  • MD5

    9e85b69490d6d0659326285336fc0c7e

  • SHA1

    ff8d80709553a0e9e1929fda0737cf9330f8ecdf

  • SHA256

    f5a6135cd6248f0f178ed133779e0d4b9b5550339051ff2a040cb61ab3c5a4f3

  • SHA512

    0c90c8dbef986767b6208e6c9a539d73f3098330beb0cf01dedc85a4ffd752d725fb8c522ee590b20996dde7e62b3812a64a4c818fa680d01fb7d891943d7515

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6ixHs:AnBdOOtEvwDpj6zH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_9e85b69490d6d0659326285336fc0c7e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections