General

  • Target

    2024-02-22_8e729751b779918561c16fee0c3b908c_cryptolocker

  • Size

    126KB

  • MD5

    8e729751b779918561c16fee0c3b908c

  • SHA1

    bc437baafc8ff016609d7993b922ad9258b4bbfe

  • SHA256

    9e521a2e426e52c8996670c4776e101d173e3f6b0c94b77f5a9b4f6fa6f19d71

  • SHA512

    ec8e73366e48e9e206ccd5f26a2631f5331b7a19ad7a59d3731489dc4a073c28f1633ee9b535b4bafb4f42756a7572d4405c6aaf378a86b7e8e247091b53e9b6

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eK:AnBdOOtEvwDpj6z0

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_8e729751b779918561c16fee0c3b908c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections