General

  • Target

    2024-04-23_10933e91f70371d6bb819b839fd56d66_cryptolocker

  • Size

    23KB

  • MD5

    10933e91f70371d6bb819b839fd56d66

  • SHA1

    012df1090f0c09ac6af579457113b1bc6b527253

  • SHA256

    4f77111e7c13d03747f6f5c212a305bc9ecacfffece3d26ef4369d5fdd43e107

  • SHA512

    404ceea404f83e181784e15370413aa21b0e1924670bbbf8652a40e4b9a3e9c60bf7cdde2725e1775edf56a7471facf67ba67e1a9b8591de9f21d499a3a679d1

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hn8:bVCPwFRo6CpwXFXSqQXfjAH8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_10933e91f70371d6bb819b839fd56d66_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections