General

  • Target

    2024-02-23_767b4e211d1d6a7c2717ac6adec6489e_cryptolocker

  • Size

    87KB

  • MD5

    767b4e211d1d6a7c2717ac6adec6489e

  • SHA1

    d08c85aba217e8655842f4392d4393e4d7c801d4

  • SHA256

    565475762f46fb713f07dfa17c6cac59c31e745e1f57df1457495c0b9fcce8d2

  • SHA512

    5b05da3ebb2c199d90c31030178c745c6d1c7caa1591fa013e8ca17c61e41e470d38c0755302d7d678802142b42051f91420d140d521ea5d4343aa391ec3ca0a

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgSA:AnBdOOtEvwDpj6z9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_767b4e211d1d6a7c2717ac6adec6489e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections