General

  • Target

    2024-04-17_bf7d24389f184605792653fa95e62a22_cryptolocker

  • Size

    22KB

  • MD5

    bf7d24389f184605792653fa95e62a22

  • SHA1

    14ae32da02d4166f176cca1196ad495d88880d4a

  • SHA256

    e9f8890d38c8e50c36bdd50e1841e7abb7342350f78fc842156054282fa21177

  • SHA512

    bab364d1a07eba86430997bc5e379d6c6440d61d3aa687209135ff09098b05a1c7de50ace0722f18f23b92cb378cf8e84b74a66673b3ebf3acc529442e214590

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hj2:bVCPwFRo6CpwXFXSqQXfjAi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_bf7d24389f184605792653fa95e62a22_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections