General

  • Target

    2024-02-23_899c7a676ce050141cb44c2a86ffc5c7_cryptolocker

  • Size

    33KB

  • MD5

    899c7a676ce050141cb44c2a86ffc5c7

  • SHA1

    3e6a93a34d299f7ebc0b0854c2132c08ad41daf7

  • SHA256

    a6a0b7df511563451bdb3ad65c7a1655ed6317fe07e37b6bb5d788a929ffae21

  • SHA512

    931a7383dedfd27c1d11f7d0af70a28f348099bdfb8b35eed51ed50f699c76be11644b9b3806fb54eaeb5e8c7d718ee784b8e7281d7c9809c4d0bc0f9fcae5d3

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axKc:qUmnpomddpMOtEvwDpjjaYar

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_899c7a676ce050141cb44c2a86ffc5c7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections