General

  • Target

    2024-02-24_0baf36959f40bf59f691e68436534263_cryptolocker

  • Size

    87KB

  • MD5

    0baf36959f40bf59f691e68436534263

  • SHA1

    8475f8fc5c5e1e4ac16d70db77b663966b4534c3

  • SHA256

    936579477fb4d1d9b36f5f6184da3bf76fe7b63360097c00295d0c9305379b28

  • SHA512

    05fd1ececd557a730b4f2644c3da54275711678bdf4a87505e904291d4f2c5acc2580a4bb5f8e522372d094e1418b990051a7dd06e1f38755ef996902b7d7a43

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgLJ:AnBdOOtEvwDpj6zB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_0baf36959f40bf59f691e68436534263_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections