General

  • Target

    2024-04-11_778f814b9b8b85390e14ac88062f039a_cryptolocker

  • Size

    129KB

  • MD5

    778f814b9b8b85390e14ac88062f039a

  • SHA1

    14f5562b86ce05c571b13c11237dd42639788d8b

  • SHA256

    af176a52904088104ea2578fac9e52fbce5b9357e5e605d4b58a4e8035f713b0

  • SHA512

    05f211e8b2943de8cc26a34d12be20ab2bbd227ca93d7740709da092c4c3fdc8fce86abc712943b66337ecb3cead31e1d12f89284a46e2c95e2155ed91d546c6

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI7H:AnBdOOtEvwDpj6zC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_778f814b9b8b85390e14ac88062f039a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections