General

  • Target

    2024-05-16_69427400acfae163bba569c8d48fc43a_cryptolocker

  • Size

    71KB

  • MD5

    69427400acfae163bba569c8d48fc43a

  • SHA1

    b348eef8a9246d5f59ac5fda803b5c173fa1336b

  • SHA256

    6f3fa7f968db7f78a88c62f35947e8f7bad1ab2bd9f5c53415e30cc5a2717629

  • SHA512

    36c9b0f06600e9afe5b75b022e0a9261003d991e0ac52d9532be29b2103132a2a35435e87b948860ae9ea809dafe8f0afbac7e7419c67428e858754880e253a8

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9q:C4Q2c94OtEvwDpj4H8zP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_69427400acfae163bba569c8d48fc43a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections