General

  • Target

    2024-03-20_869fbe2bc26df15c08f3773f0e22a422_cryptolocker

  • Size

    35KB

  • MD5

    869fbe2bc26df15c08f3773f0e22a422

  • SHA1

    9bedc2da30c88da9735ecebb57e0943321f48ca8

  • SHA256

    8c10db8df2cf8f37735f88eeaccf3fa2c8e249615923a14a632d1db9aa6d1a65

  • SHA512

    ccaaf0b55f6ca1c8d396d3313b89d7f1b21bd21624e9918d26a0de801929a25526161fa40f0495a29985c12647c5e6eeb41cab95425663453a210b4e58d68272

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkUI:qDdFJy3QMOtEvwDpjjWMl2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-20_869fbe2bc26df15c08f3773f0e22a422_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections