General

  • Target

    2024-04-10_e628975dff0e2bcc8d022d4fa17f7b04_cryptolocker

  • Size

    21KB

  • MD5

    e628975dff0e2bcc8d022d4fa17f7b04

  • SHA1

    a3a983acc671128ad67f6d33c7ae2e55b3b6d20b

  • SHA256

    65f0ff637b21df77ecd3e79cbd374930fbc5c71560ec0ccd2a18498ca7d4bbdf

  • SHA512

    9c6f8d33913e7066093d02ac546eef089720718e74d5255a7b00d1baf1f2cbfe90c7a40e695355b9f23f47eb8745726b7a726863e1e7718a358a7400e7435fd6

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HK:bVCPwFRo6CpwXFXSqQXfjAq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_e628975dff0e2bcc8d022d4fa17f7b04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections