General

  • Target

    2024-05-02_fe59fe3e0a15a261ae7e5e1f15c3dd54_cryptolocker

  • Size

    23KB

  • MD5

    fe59fe3e0a15a261ae7e5e1f15c3dd54

  • SHA1

    249e9120d58ebecd555c0e57baff18885130bc97

  • SHA256

    6a2e4a49599ee908f8d9ef0498faf74b24571e61a78e3e9c23526676c738242c

  • SHA512

    492486339c4d4963e80d266559b042a03bfd74621e5a4ee27e96a5ae4ebeddc841fc5f4c1e2ab81a4383cc17b33922842bb9a39b6b5a734d0d24bf1708422d26

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hju:bVCPwFRo6CpwXFXSqQXfjAa

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_fe59fe3e0a15a261ae7e5e1f15c3dd54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections