General

  • Target

    2024-05-23_55d220a1f1970dc1f0c6b460735e6f63_cryptolocker

  • Size

    24KB

  • MD5

    55d220a1f1970dc1f0c6b460735e6f63

  • SHA1

    aec569f63fbf62e635da28a618247c0970fe00d3

  • SHA256

    686a049679f905483630d99717d829e45bf5aa5eb46a23e13090023ff09ebc11

  • SHA512

    dfb7e8d6b5a6f249fb8b6f95879abf5cc3f0e0c7cb0e682a18adc005e261b6d13a21a8871fe1bdb7d5d067e182a971de3ec2e5a9af0a8f9e0866a13657d406a7

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHB:bVCPwFRo6CpwXFXSqQXfjAsmHB

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_55d220a1f1970dc1f0c6b460735e6f63_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections