General

  • Target

    2024-05-02_5d1212470c20e6f527d909bd90806f1c_cryptolocker

  • Size

    24KB

  • MD5

    5d1212470c20e6f527d909bd90806f1c

  • SHA1

    ff4791ba7c7d2c64513928c5d4ea794cf771cb39

  • SHA256

    76216c6014b2bf0843ccdec00011468134c33cf7ae8c64ee94ea9e2c94706a58

  • SHA512

    f211ee9b6b76613c213322e281d94f190e7b9ecb3dc43b73061d2e7eada7950a06dbd2c73ce21c5f45db899956edf97452ab8ba1c7b2ce513b404457a5e99a97

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnI:bVCPwFRo6CpwXFXSqQXfjAHI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_5d1212470c20e6f527d909bd90806f1c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections