General

  • Target

    2024-04-09_f492f0491ad354f8f07eddbd361bda0c_cryptolocker

  • Size

    21KB

  • MD5

    f492f0491ad354f8f07eddbd361bda0c

  • SHA1

    7c0402df4809e65a469ea726934314cbc7b39b49

  • SHA256

    72aee34dee7eccbe8cf656fecf322034201e5795fd54dc27438c31c4a5e54dbf

  • SHA512

    9b3713c8e6f54b412da49c9a7f9dc4c434b44f42fdb13ea259a6f7f223ac3d12fb4947b74c2ed4a1ff2bee4a3da412304ac9a12bca349e41b32395d6d760e050

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6H9:bVCPwFRo6CpwXFXSqQXfjAd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_f492f0491ad354f8f07eddbd361bda0c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections