General

  • Target

    2024-04-10_ba687c0b029f67afa18f2ac19350dce9_cryptolocker

  • Size

    21KB

  • MD5

    ba687c0b029f67afa18f2ac19350dce9

  • SHA1

    a9f714ede8fdd7f760324dbeeda20e9f0943e438

  • SHA256

    ed60da319c0feb12e9c2ddda86fddd1182c9e3e9afcaa42c5da4415c8fb9149a

  • SHA512

    ab82d42fd66891dd72b9c922b2530e3f6a51e4cb830a6e6033d1c6d88f72384369577a86d195e396eb7fd7150ba0e51ae9680da69ed6d1f8f3d97bfeecee2bb9

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6H+:bVCPwFRo6CpwXFXSqQXfjAe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_ba687c0b029f67afa18f2ac19350dce9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections