General

  • Target

    2024-05-14_ef3bc72ec229c560a7de92de7889eb82_cryptolocker

  • Size

    24KB

  • MD5

    ef3bc72ec229c560a7de92de7889eb82

  • SHA1

    bf17526990f3fdc14c827cf393ee7836f85ffd95

  • SHA256

    5a40ee787284029772b6feee79745c3b6a82c40eef423707699fe427ee1d592d

  • SHA512

    07dcacea045e2480220650c15222133ce5c7fd45d08ebf5689bd39a274e5071c170223c33970317c1736ec7b225b166e60a7c79ca36e150dcbd4b9b140cb742a

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmH9Ii:bVCPwFRo6CpwXFXSqQXfjAsmHh

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_ef3bc72ec229c560a7de92de7889eb82_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections