General

  • Target

    2024-02-29_39cfa6f987f09ead1ab9d6058000b4ca_cryptolocker

  • Size

    87KB

  • MD5

    39cfa6f987f09ead1ab9d6058000b4ca

  • SHA1

    3771c980095e0aa40152534b603931193029dc9f

  • SHA256

    26468a5ed78da7541e52fdd7eb7e8ac6eef9e47eec322de28571e944023081fd

  • SHA512

    702c71b53b5bb1be015bd85b1fc74c0fb58b99781ea23600475765a66bc0b5f0724543bd0d510066c563cd7bf4c97210241d9273566ca57a68ebc5bed306e4d3

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgSI:AnBdOOtEvwDpj6z9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_39cfa6f987f09ead1ab9d6058000b4ca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections