General

  • Target

    2024-04-17_f3c68ec05c4c77d280388c392574a8bc_cryptolocker

  • Size

    22KB

  • MD5

    f3c68ec05c4c77d280388c392574a8bc

  • SHA1

    8faad01f8c69c0477ac64a0064a0d0db67304cd3

  • SHA256

    970218c560b29bae40eb2cc1425c6f76057290b38852bb7c4190edc540c77086

  • SHA512

    a2e59d83d8519368034830be286eafd5aa6b42b3370b242a873b2cb1c527ba13875afb21011a3c4debb4b7f0b935034a7749513183432ec055e0f0de0204ef8e

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnH:bVCPwFRo6CpwXFXSqQXfjAHH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_f3c68ec05c4c77d280388c392574a8bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections