General

  • Target

    2024-04-30_ca686215c99ee0c3af4ffb805e3b3dc0_cryptolocker

  • Size

    23KB

  • MD5

    ca686215c99ee0c3af4ffb805e3b3dc0

  • SHA1

    534b7d82fc0c935144f84a1aa2b7a923ed89be2d

  • SHA256

    9bd52a46b2e38a2e26ef45c6e442e6cdce39e5cc1a5c1fce7cdcef494d28abe2

  • SHA512

    fc8ac734f45d6e56f443a44907715ce8bd0df6ed60257eb302ea21deb26797f923cf5caf4d45029401ab7aa30e78ee9775524dfaee3e6b249e21dd2f99865281

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hni:bVCPwFRo6CpwXFXSqQXfjAHi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_ca686215c99ee0c3af4ffb805e3b3dc0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections