General

  • Target

    2024-05-09_648f229f1d173a44b0d9a7f8b3fb4bca_cryptolocker

  • Size

    23KB

  • MD5

    648f229f1d173a44b0d9a7f8b3fb4bca

  • SHA1

    28203d36258893687e4abe277627f1b073450f31

  • SHA256

    e1fcf2c5b1eca5e8e43d7283de2e7b1b034f7890294bce4cf3179ab35e5a3744

  • SHA512

    a172504cb6e73b21c7a8cadeeaaa16112226f461c96cc7a45792ab51992e4cfbee2a1b41e3a1a89fd1ed526c14fb278e9a57a22295874cd110d34f47d77bc42f

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hnm+:bVCPwFRo6CpwXFXSqQXfjAHm+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_648f229f1d173a44b0d9a7f8b3fb4bca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections