General

  • Target

    2024-04-20_774e225c5d6e0c372241f3e3b8aea435_cryptolocker

  • Size

    96KB

  • MD5

    774e225c5d6e0c372241f3e3b8aea435

  • SHA1

    abf0cdbd4d48832bfb2c21216a9919d24c7ff39e

  • SHA256

    d9a1f381cac9f67316292948562963982642acfd856a2f30eb3ec0c8a01b8450

  • SHA512

    64507d9c99f57ea1603bbc0054611c3b6b01efac3a1210ef88e1474298a74351d6842fed4f0ce3e8547016d77b5d1ef0c51249be5170336655621759ad186693

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy99:AnBdOOtEvwDpj6z4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_774e225c5d6e0c372241f3e3b8aea435_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections