General

  • Target

    2024-02-18_ed9a9f4cbf8da1210cb4b36b444de743_cryptolocker

  • Size

    33KB

  • MD5

    ed9a9f4cbf8da1210cb4b36b444de743

  • SHA1

    1a49c88f94948f10b1d42e10ac20244af6e3172a

  • SHA256

    4d04c55639bbee619c0cc20ce200a24594c443e5a4a058e03d3426e140444ebd

  • SHA512

    ebf136c55bd2cb0629acd58e9e51b302e10526a86b510659b6aabab8a11dad88aed547d3f8d1ce6ef7d29e6441fb2e643613cc2b3f8a659bf4f56b3547b38460

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axr:qUmnpomddpMOtEvwDpjjaYaN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_ed9a9f4cbf8da1210cb4b36b444de743_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections