General

  • Target

    2024-04-24_c8dfb6d7451e853d9e1add709359c290_cryptolocker

  • Size

    23KB

  • MD5

    c8dfb6d7451e853d9e1add709359c290

  • SHA1

    fae1788a58670440be5dbc86bad12f0dc42e6d56

  • SHA256

    c01cef754efba7a094f6160c38367b1ef9d7cb279c34ef0672487cc7ba29243d

  • SHA512

    4180d92fbc1bfe05666f4f284f43481f6e984c9308d4ed2b1e4f4c83a94878053dc08c9bc1052e6db536bc6381677ffb17155f2e610b133a7e6c565c44e54f26

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnpE:bVCPwFRo6CpwXFXSqQXfjAHG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_c8dfb6d7451e853d9e1add709359c290_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections