General

  • Target

    2024-05-12_f508fb64e2ec6b3742dab7939e279d13_cryptolocker

  • Size

    24KB

  • MD5

    f508fb64e2ec6b3742dab7939e279d13

  • SHA1

    1b02a08803215326235ef5b6b3cd529c077579c1

  • SHA256

    41c9fabeddc59cec59eaffda4744d9ffdc8c386b3367ff0e6c97a786bcc40520

  • SHA512

    6d34e0ebdb30d0050e56e19c8b5a8c43cdc10c458a111e2024cbcd8b6a359dab90898aa016ad786e3ac61fc94c08e73d3b487d3035b132c3ae9c11d81127b1c9

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnpE:bVCPwFRo6CpwXFXSqQXfjAHW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_f508fb64e2ec6b3742dab7939e279d13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections