General

  • Target

    2024-02-17_7b8456a5fdf01034570cf5b7ec188be9_cryptolocker

  • Size

    89KB

  • MD5

    7b8456a5fdf01034570cf5b7ec188be9

  • SHA1

    efd140c716bcae6bf8743cc60dc2757172fa1bd6

  • SHA256

    6b030425f8dec59fd90cd4dcd217e60c7ef3495ebc5b1add75f0abdf61e5acf1

  • SHA512

    15592fe1ee88f92d62532b392b3e3a3eba365dcf6c7e107bc3fdc32b3b4edb99eee778d141a0b8acb75f114585b763705224e2a78840afdc753cb008d06f5ba3

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg1V:AnBdOOtEvwDpj6zj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_7b8456a5fdf01034570cf5b7ec188be9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections