General

  • Target

    2024-02-23_db80a0c8a42de34584a5142b05e3f56b_cryptolocker

  • Size

    34KB

  • MD5

    db80a0c8a42de34584a5142b05e3f56b

  • SHA1

    863929cd474b522daaf1c586cafb9a07b8727903

  • SHA256

    39e9de173e7101b52c422a17c68a081ccd27d330148b3513ab2176c5ed80b632

  • SHA512

    05706cdc49ddd666ac871400186c7e94fc4f7a13b3cd2e7cc1e92015d300f7224a4a21b222ad8abf1a53ff8d95f51453650eac51b5b3f6006ff7ae512b852e28

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax4q:qUmnpomddpMOtEvwDpjjaYaOq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_db80a0c8a42de34584a5142b05e3f56b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections