General

  • Target

    2024-04-17_9e39e0abd3a3db28de1f13c7b2d0189f_cryptolocker

  • Size

    70KB

  • MD5

    9e39e0abd3a3db28de1f13c7b2d0189f

  • SHA1

    a8c917d265e6bb100e94dbef5050a80fa28ff59d

  • SHA256

    ea9cccd3fff98ca535e1b74cc5e316f4e53e299a8b3aed0033a7a26fbb5afa6b

  • SHA512

    8b579642e7f34758e49a11a67af45e21084e4c8152b4d662fd9a5f689855d8a1fe0df1e054cced8983fb2e01d783eeee07143a299c8822acae53878611c5f8aa

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9T:C4Q2c94OtEvwDpj4H8z2

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_9e39e0abd3a3db28de1f13c7b2d0189f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections