General

  • Target

    2024-04-23_6423e369b2b62a5db578d62cb4af9b7c_cryptolocker

  • Size

    97KB

  • MD5

    6423e369b2b62a5db578d62cb4af9b7c

  • SHA1

    c36dadfb4ed5006a422066529a1da1b586549a3e

  • SHA256

    6347edf9ef462555c03c72ffc1f61f6f965830b6edde489c872338e0174440ab

  • SHA512

    b993d6fee05133a4d8cd2f8751ee9f95b4b9b6eb32a9cc02f1bf8ab7e533465c6cbf714dadc1fd7681e88cf356ea5db68fe57453a2afe6ff89d1ac851cf49c14

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYy9Gdc:AnBdOOtEvwDpj6zw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_6423e369b2b62a5db578d62cb4af9b7c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections