General

  • Target

    2024-02-17_e9e3fb8427c2c5f172a872106ecb0004_cryptolocker

  • Size

    125KB

  • MD5

    e9e3fb8427c2c5f172a872106ecb0004

  • SHA1

    cef9a5ec8bb63e6218bf13e5adbdf4f484859644

  • SHA256

    9b0dc7cd744e6a192cd0d9ca73f360d2f84c1c945ac8fd0b7d293e4fb0b48983

  • SHA512

    dd7c73bda3a089d6eb8cdda8e2d37de4d281addf7f463e735937578e521d778e7a8722b448cea6db1a2ba605f45e811725b657ee3fc4903898dbf69da8ba1ef2

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eH:AnBdOOtEvwDpj6zd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_e9e3fb8427c2c5f172a872106ecb0004_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections