General

  • Target

    2024-05-23_b94d7bf017eda6a29e3d41e8b40e8697_cryptolocker

  • Size

    24KB

  • MD5

    b94d7bf017eda6a29e3d41e8b40e8697

  • SHA1

    4d56d32a18cded0bad75b044221e0e7b8c8941b8

  • SHA256

    f722f28cea84de3b55c9c5d0281d9f003a49475cc1d43c39bf7bd1fe8b0d321a

  • SHA512

    79b22cca7ef2cd425caa9cf90a7ca34d031549460ee284128a645b13df027403f7b792058e8b7a03c5fd1fee3f2db0b73a946b77ccb9119b25d8c4276710409a

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMZ:bVCPwFRo6CpwXFXSqQXfjAsZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_b94d7bf017eda6a29e3d41e8b40e8697_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections