General

  • Target

    2024-04-17_6d40519382e1bfa90cc068679e5fcdb5_cryptolocker

  • Size

    22KB

  • MD5

    6d40519382e1bfa90cc068679e5fcdb5

  • SHA1

    215a15d9d98a575d8e154333ce1086ebeca365ca

  • SHA256

    9a0c0d7eaac7013a983ad48e137f809fb98d502ee6cf8028b2a8489418c7c2ad

  • SHA512

    958f4c74360df8b7c5bd2284a07f621ca16bfc714f9a5aff104d91d9964cb996a803870f9e74640d0b6513d466aca45da03676dd56ebfef284fb0a3b482f5789

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HS:bVCPwFRo6CpwXFXSqQXfjAy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_6d40519382e1bfa90cc068679e5fcdb5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections