General

  • Target

    2024-02-22_948b3d1888479c47ee7fd7f3aeeef348_cryptolocker

  • Size

    35KB

  • MD5

    948b3d1888479c47ee7fd7f3aeeef348

  • SHA1

    3d7d922463dfa7b48bd3f847f64e25848acf4e18

  • SHA256

    521721d8b91d2a5989bb41efab39589b601ea63ac294e5a2d62b3e1e378da626

  • SHA512

    d076c56674428b20c5f0c8af44e2bb814b5e77e4ea803e5a20cb9bf9630c6d79bd2793d03eb0bd3af856ab0d3264a36a5934ec287b3422d47ad655d423039370

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+7:qUmnpomddpMOtEvwDpjjaYa6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_948b3d1888479c47ee7fd7f3aeeef348_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections