General

  • Target

    2024-04-30_ea23b675e02f2cf334085566518be543_cryptolocker

  • Size

    71KB

  • MD5

    ea23b675e02f2cf334085566518be543

  • SHA1

    a9c3a3225f3f271c3501b38467367053a16c999a

  • SHA256

    7ef9a19fa37ec4d4c083735678d78bb6853aefaf26819fd2fa1bf442579bda91

  • SHA512

    a1eac8961a2b826e037f6f97cefbaee2e9931bcd28b0944504f07e462e8f151bc8486a98e2d4f25c70b580553bc1d3cc50b6b3a6eb68c1d656074b3f6d284191

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9j:C4Q2c94OtEvwDpj4H8zW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_ea23b675e02f2cf334085566518be543_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections