General

  • Target

    2024-04-15_d38bfce10a2cc783153cb45e32c8a5fd_cryptolocker

  • Size

    35KB

  • MD5

    d38bfce10a2cc783153cb45e32c8a5fd

  • SHA1

    9728885416b8335414a890e72c951a6821a69594

  • SHA256

    13dd423010d5d176eb25adbdfa0cb90ebc6a2c0b250e129ff98ef45f1e79c58e

  • SHA512

    7a5335bd15d18475cf680065492034404a91c18b7b90df6469d5f9ee524ffb80b9e524a3caee61e47c728d5df854a7884dd92b4de59d89cf0061743181cf904e

  • SSDEEP

    768:b7W5A8WtijKeOcfXor3BPOz5CFBmNuFgK:b7W5AWjTGx04

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_d38bfce10a2cc783153cb45e32c8a5fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections