General

  • Target

    2024-04-30_e4ca8933f6d6ab92c190d3c4a68ef715_cryptolocker

  • Size

    88KB

  • MD5

    e4ca8933f6d6ab92c190d3c4a68ef715

  • SHA1

    25c5e0e56864c6e78b0e58e6dc4d06f68032c4b7

  • SHA256

    43cabdd252a13071c6c7638c5e974c04497cb566a96ae00f425437b5dc280faa

  • SHA512

    986bfa233d2d28c38e20c3b4b8c2c7d5cd007de1ca5c7c678b8c17e83373f0794839a23ba2046da54a570d04eece94ea5b7d0216c5b15a25e3a614e96b2313bd

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgIi+:AnBdOOtEvwDpj6zM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_e4ca8933f6d6ab92c190d3c4a68ef715_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections