General

  • Target

    2024-02-29_4a083558bc573c08b5c2977411363b40_cryptolocker

  • Size

    124KB

  • MD5

    4a083558bc573c08b5c2977411363b40

  • SHA1

    f83401c01ac6a3271f12ff3fb24a181cbd89357b

  • SHA256

    8bdb1f3f71f0b61a57a593e8ae2a7ef2c3451e09d107f213d4aeb35062b5a31d

  • SHA512

    bd3bfcdfda16c338d0bd9b5399068d5f6f462ca464305881c82b51615a2db024f9ee8462ce7b36aee60cb7ccf24b32743dd106a7ec13223b0f78b88d3217d0bb

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIj:AnBdOOtEvwDpj6za

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_4a083558bc573c08b5c2977411363b40_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections