General

  • Target

    2024-04-20_ff44c205a87b4d4d001484eb4c226f8f_cryptolocker

  • Size

    129KB

  • MD5

    ff44c205a87b4d4d001484eb4c226f8f

  • SHA1

    ad54f8eca90731b4b77c0f3bac7f743dd1fb23a6

  • SHA256

    c159c1e6846c7ba4f7dbed1fb3bbd158db3798998fe628d4637a7f17c6a27c57

  • SHA512

    28e4571e523c25bd68e85c085b16c99d40dd348662fad3bc5984123488be69f0400b13c5135887566e5ebc70a5822e4eec2565aa8b161f1789a2ceb4dccde999

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI74:AnBdOOtEvwDpj6zh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_ff44c205a87b4d4d001484eb4c226f8f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections