General

  • Target

    2024-02-20_996ca48e003ae4f43e2513ac81e1e278_cryptolocker

  • Size

    87KB

  • MD5

    996ca48e003ae4f43e2513ac81e1e278

  • SHA1

    0bd56145d18326ea039e35fca64cfaf7b0775c17

  • SHA256

    06bdb6dee7cd186c4790274ed5f3e6774256ec3b292aca61fce42a9adc2945b3

  • SHA512

    408fd7cd3137c47af01dd0d8a72af2834af8308623fb15b4075a1ad9a55061c8fa8e2193f166dc6bbaa1116f6433b9f1952ba7dc553f5796855bc66eb3bb9230

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgSU:AnBdOOtEvwDpj6zB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_996ca48e003ae4f43e2513ac81e1e278_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections