General

  • Target

    2024-02-18_35e4d45cac4a5ca5bd3fc3be720da224_cryptolocker

  • Size

    34KB

  • MD5

    35e4d45cac4a5ca5bd3fc3be720da224

  • SHA1

    1db5912fc8e5ba5b8d1a33e1a792cb9d1176aef7

  • SHA256

    6a525cb47b5f2cde965352b0b0770b5e69b64711e849037eb31db33415db31e2

  • SHA512

    c04a0213436337dda7dd34c29544d768ada944737e1634243f747e75f22d8f269841336c035e13f68f0401173f1a4afd39ab5b00aa9b7f16b3037a7775353c65

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+E:qUmnpomddpMOtEvwDpjjaYap

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_35e4d45cac4a5ca5bd3fc3be720da224_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections