General

  • Target

    2024-04-24_bdb0bafdd04a34599f5134f15438b209_cryptolocker

  • Size

    129KB

  • MD5

    bdb0bafdd04a34599f5134f15438b209

  • SHA1

    b61a9aa189be1a36c3e4b4b6a8398fcbbdcb21ca

  • SHA256

    d6e9b44eebe5a3368a2c157eb7882db5e172ba830170764c587b0e5c3b9f9ed8

  • SHA512

    cc74c309836517ba9ea9d7ca41088df8d02a06dcb08eeafb4b4ee1ce1a81cb6898b370e6745a0d489cb541fbb0928ca3c9d16e6bad7bba6a10d8982fe869b0c3

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI7d:AnBdOOtEvwDpj6zc

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_bdb0bafdd04a34599f5134f15438b209_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections