General

  • Target

    2024-02-23_7bd53381415542267ef50357f512c84c_cryptolocker

  • Size

    92KB

  • MD5

    7bd53381415542267ef50357f512c84c

  • SHA1

    3f0d794163d233d4efe9f4e13aedf796ae4cf258

  • SHA256

    10d39ee04511c5c7cdf65ed6aa0e50fb5fab01296cc6d6335677ffc35eff521b

  • SHA512

    3958427caf74f93f53dcae75ca9642469f8bbd3af2eaaf184a95db62bd8207aa4c2576ae540d615b9d8ca3212a65837813468254101a51a58f574ab371709c28

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0olz:AnBdOOtEvwDpj6zq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_7bd53381415542267ef50357f512c84c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections