General

  • Target

    2024-02-14_a6022cdd2e503bbe2e44467c89b7e969_cryptolocker

  • Size

    126KB

  • MD5

    a6022cdd2e503bbe2e44467c89b7e969

  • SHA1

    df9ee9b5c1469450c860c527a59675b242ef90ca

  • SHA256

    6ad15a43211bb8aadb88d108354aacfc452d91aab0fb1c5f94e8702d0bddf247

  • SHA512

    73cc35602df17f27157d18ce6f72344589de0ca0963a65c14e9ebedcb7ade26d3898b3d06b1bbf561bfde043cb17adc72cedf96c71f86607a12a9c061724c51e

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1emK:AnBdOOtEvwDpj6z/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_a6022cdd2e503bbe2e44467c89b7e969_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections