General

  • Target

    2024-05-22_9787eaa1a0aa49e657c50841d7bf2a14_cryptolocker

  • Size

    24KB

  • MD5

    9787eaa1a0aa49e657c50841d7bf2a14

  • SHA1

    beaa6f66c0930e35495922c9c0eeb37ae677f77c

  • SHA256

    3bb0db7d9cf6baec231cb9d4a110ff7608a3492b73fb336721692e46dabfa0fc

  • SHA512

    96a5548f67567eb14448005e41b0ba1266e9f07c64dff92394f5a731ba58464774e62aa5fa5a44d9f1c61a798f8bd35d375664e38145534deeac8c5a9f426c34

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBM:bVCPwFRo6CpwXFXSqQXfjAsmHBM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_9787eaa1a0aa49e657c50841d7bf2a14_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections