General

  • Target

    2024-02-22_691e0a0e7a982708a299f42186eee0e5_cryptolocker

  • Size

    87KB

  • MD5

    691e0a0e7a982708a299f42186eee0e5

  • SHA1

    519ba22deea69475dfd05b10ee7de2f81a69c80b

  • SHA256

    6a6eaf1db94b55304009d0e6bb0df11ad0bf016a17bba6b8b8cb08bc9bf4f3e2

  • SHA512

    29ea14229c5cf84f64989179c10f715c5f1a60e9a0eb68bac8c65dcb39f96e9a1bb2c97e65656d7be6e125a53dd551842e9d4673b4482502b5ebf27b6496a483

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgSg:AnBdOOtEvwDpj6zd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_691e0a0e7a982708a299f42186eee0e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections