General

  • Target

    2024-04-19_5f9cea5e6e930ef18c3e8f4cc839fc01_cryptolocker

  • Size

    32KB

  • MD5

    5f9cea5e6e930ef18c3e8f4cc839fc01

  • SHA1

    cc96630d14a1bce70f87f4607fcf03998fc8e5df

  • SHA256

    5ca6b727f463afa5244c51ff80b7bdbd68184bbfd4bca4b03b1f958c437cd9c7

  • SHA512

    b2880ba59a7813c8220335f78a9e78cde730202b1dd9aa1b120edac85a4195ae6fe07f80de49c6bfa765c922d01b5b1d21842f0f5adf011b3a5bdf3c97030db5

  • SSDEEP

    768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtt:bFPmpiif/oc+vt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_5f9cea5e6e930ef18c3e8f4cc839fc01_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections