General

  • Target

    2024-04-27_5b32aa0d4ec5b5c8acaa16cbbf513bc2_cryptolocker

  • Size

    23KB

  • MD5

    5b32aa0d4ec5b5c8acaa16cbbf513bc2

  • SHA1

    e7c1ec3caeece35ebe5f7fd2a09fb7831f019693

  • SHA256

    64836ac3d2262215d8757caf786f7a54df2e8b993da646f1b441567d1ad27a03

  • SHA512

    940574a6ffad35bd1b79ca431e3e79de6f9bd4d5425837db9cc85741598ccfdbbaec73482850214cc99d584b5b4f6950e8e6a15ac89cca8a54d360e287dc81a5

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnA:bVCPwFRo6CpwXFXSqQXfjAHA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_5b32aa0d4ec5b5c8acaa16cbbf513bc2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections