General

  • Target

    2024-05-14_db7c3455a042e4a8ea3689eaaf064523_cryptolocker

  • Size

    24KB

  • MD5

    db7c3455a042e4a8ea3689eaaf064523

  • SHA1

    453463dc7fe9a97448a6c4d97985c94c407bb8d3

  • SHA256

    44de6df4cbb8e13fd7c1895025b09763a2c66e4f824d417e5a7ab5df3b68cc05

  • SHA512

    9fd492129fad8c2e78919ce95dd6c4e9d2aea3cc21f4ae783ed26b4f456de55ca50f3f718e0663eef230099d3590689e307fe98dcc5a1dd3ce4125b44d7aae78

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HnpX:bVCPwFRo6CpwXFXSqQXfjAHZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_db7c3455a042e4a8ea3689eaaf064523_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections