General

  • Target

    2024-02-20_86bd39686e9e698210d221f1df4153c9_cryptolocker

  • Size

    100KB

  • MD5

    86bd39686e9e698210d221f1df4153c9

  • SHA1

    81f117896bc5c0776537585bd846a73690be9d2d

  • SHA256

    ab1f8838ac8dbca68683b7d9515302e995a3139371466111c06831c9eec70386

  • SHA512

    7b1f6534349a6dfb431f5a5813251ef1034e33bb82563879456ca9fb12c1174d21962435a47108737727c885d159ea658d12f2256f4492dc892f92d66de86d21

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPeBt:AnBdOOtEvwDpj6zW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_86bd39686e9e698210d221f1df4153c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections