General

  • Target

    2024-04-08_01692ea3545d3330bfdc03ff8bdeceff_cryptolocker

  • Size

    36KB

  • MD5

    01692ea3545d3330bfdc03ff8bdeceff

  • SHA1

    f6c1077205298be9ee6fc1e7a659690a89f72b94

  • SHA256

    069ed561e20c2d239bd1fbe66778c771717eaf3f77f575d01924aeae5cd52f00

  • SHA512

    fbd254eb1b7c76f55e94c4aa4a989a31157f7747c45bb3dc0ea706d2dcaf97afe268a0537b940b447772436b0b2c877779a91b7702974db7558730d3eac66fc4

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITz:qDdFJy3QMOtEvwDpjjWMl7Tz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_01692ea3545d3330bfdc03ff8bdeceff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections