General

  • Target

    2024-03-11_4401f90487e2d0ab327f0070682a9cfa_cryptolocker

  • Size

    95KB

  • MD5

    4401f90487e2d0ab327f0070682a9cfa

  • SHA1

    bf678b8881ef3d51dba70caffd58cc347cdd4615

  • SHA256

    83251526b0f77d346bf984d278603e068866c2e365c8c2dff2d6b5a7addab53f

  • SHA512

    09d76bc618ce4b8af8da18606a55ab75a380ee11d2704748eb76b2200cf9d609fc251f5ada46191d3970942eeec60b0c12104b2568682db413d63a5f205c488f

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01OM:AnBdOOtEvwDpj6zT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_4401f90487e2d0ab327f0070682a9cfa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections