General

  • Target

    2024-03-28_4396d6666714e3cfa4d6c626b1168d9f_cryptolocker

  • Size

    127KB

  • MD5

    4396d6666714e3cfa4d6c626b1168d9f

  • SHA1

    7328159f33c3d515a749ad896a919a72e3e630aa

  • SHA256

    565c6262f8e6199aa460779f21e0b34c64706ac312d1fa6b1d03f055818338b5

  • SHA512

    049e98387dec7e6e201d1a9ba9acb08c028914fc946cc105e9020a315a56308df44dffb199a6aae3692794f0fbf46dd196b93ff5769e910b028b9517a3637f54

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI+:AnBdOOtEvwDpj6z/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_4396d6666714e3cfa4d6c626b1168d9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections