General

  • Target

    2024-04-27_c1e4e386ef755e713616bdbfec6b5322_cryptolocker

  • Size

    23KB

  • MD5

    c1e4e386ef755e713616bdbfec6b5322

  • SHA1

    591fbd8a9a9334a2d98cff1e889114e0e31baeb2

  • SHA256

    2c9591f4abd00bd0eca9f4029cb404e5ae2a5d57354075f666af89b020aa1839

  • SHA512

    f2c91aeec04685a533a2aa4dcfdca92dd4fc7492f0f1ba4c1408d61d04d8accea50adce35bde5c50ac08ec8cda268c8e23f9b9c5abeb7edcfa3b868c7532cc4c

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hjk:bVCPwFRo6CpwXFXSqQXfjA4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_c1e4e386ef755e713616bdbfec6b5322_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections