General

  • Target

    2024-05-12_8a3228cb33ac7a8254217fac34abb7d9_cryptolocker

  • Size

    24KB

  • MD5

    8a3228cb33ac7a8254217fac34abb7d9

  • SHA1

    da0f337aa22fab3b52b5e95553ea976fecfdb720

  • SHA256

    4027b60b86cb339fe3bd281d85ec44b180f2f9a3503b2ef92aba7e0c7337e716

  • SHA512

    07ef17228a7b11600e53649e4e85d336f00f5becc80e0efbccf0508957f108525c05791d13e1358e1cb6d2b77785d11369731a2360379f922437d06b6fa45d5e

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnpD:bVCPwFRo6CpwXFXSqQXfjAH9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_8a3228cb33ac7a8254217fac34abb7d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections