General

  • Target

    2024-02-14_40e96ccd221431769c4a21ff769d626f_cryptolocker

  • Size

    34KB

  • MD5

    40e96ccd221431769c4a21ff769d626f

  • SHA1

    2196cfcc1ebf93f4d49a9c91bbb2163b7d17e291

  • SHA256

    a145fc3c5c7d562400ba8c494b10d477255c647804ec18bb4fdce9add8c2d808

  • SHA512

    a902286f76ef08ca2c84ead452fb808a790bdcf68bdf027ee0253dfd2030542e47fa4969e26ff1459828494a56137d91a3c5748d06e8fd0cfc8ed78a663431fe

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+3r:qUmnpomddpMOtEvwDpjjaYaWr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_40e96ccd221431769c4a21ff769d626f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections