General

  • Target

    2024-02-22_119a32a37bda162c00991991d1b43fb5_cryptolocker

  • Size

    127KB

  • MD5

    119a32a37bda162c00991991d1b43fb5

  • SHA1

    5d7c2c81adfc0d178b541cdc00ff849b11df8a32

  • SHA256

    705f98446fcdf0afcfff1abfc554868af0c0c213e8c856fc5eac2750d4454224

  • SHA512

    454ea703d3c1a72c8464f02b588b25a94b2313d41541d4364d51adf8dca08e1cd7b4c0e6d8d384423ac1d15f60f0a569291dfc42d83ed4b2aedf698b68001fda

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIf:AnBdOOtEvwDpj6zG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_119a32a37bda162c00991991d1b43fb5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections