General

  • Target

    2024-04-23_23f6b329eca44c721c277d1641a69017_cryptolocker

  • Size

    36KB

  • MD5

    23f6b329eca44c721c277d1641a69017

  • SHA1

    e04b6896aed66726d937a9fc6facfa5e920cfcf2

  • SHA256

    4d3df76ad524c2d9dcd9cafe1653a91f6a2fff58813bb11c04b4168bcbd47f97

  • SHA512

    21e45d9fe65657fba5f43a49729dc841690da28b4f380ab2bc9971240d9d42f570901a901ffdaefc31ceb1bdce0a575986e19d2ad9ae2bcc998e225f1d2cb55a

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axK3VKh:qUmnpomddpMOtEvwDpjjaYaQu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_23f6b329eca44c721c277d1641a69017_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections