General

  • Target

    2024-03-19_34f4b17e143ece50b923de115c15bf42_cryptolocker

  • Size

    88KB

  • MD5

    34f4b17e143ece50b923de115c15bf42

  • SHA1

    4a589a631352e0e953b72651ecd3149ef6710f7e

  • SHA256

    ccdd3a28bb61e1df325430cb92e412d0b52c3cb9d85fa807a49e34e3b42e1c67

  • SHA512

    42de303ebee70449f91a39d71a1cf35988058da04cdb35a4295c988e5edcd6e963a440d443193a70bb25413f84040372b3ffd4b5cadacdd5c0b70f729e5cc647

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg8Wu:AnBdOOtEvwDpj6z2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_34f4b17e143ece50b923de115c15bf42_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections