General

  • Target

    2024-05-11_5ed6d94f7c8aacea35f59e723f4d4b14_cryptolocker

  • Size

    33KB

  • MD5

    5ed6d94f7c8aacea35f59e723f4d4b14

  • SHA1

    dde632147ef5f9814747773c6f99b70a5ab05ff9

  • SHA256

    5d040ed2047d5161632abbee20a8557f8ad93113200d234a3fd3851c5f3699d6

  • SHA512

    4019fc1885c8c4f30884af6b67989c4f7498ae895d0a9bb9ffb1bd503adecbe484df8973d92f1a671793ce28a4ea83ddfb3f2b4339b4670d0e1946d3c52cc7db

  • SSDEEP

    768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtXe:bFPmpiif/oc+vXe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_5ed6d94f7c8aacea35f59e723f4d4b14_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections