General

  • Target

    2024-05-24_9f73833d69317658cc984f1015ece06f_cryptolocker

  • Size

    70KB

  • MD5

    9f73833d69317658cc984f1015ece06f

  • SHA1

    b0ae1885c217af0ba764b0746cf1508b2ebd7c22

  • SHA256

    9772f61e8fe0ba2d5a5f90be6ce19ebf31bc5de0951c36e508816afc6f492485

  • SHA512

    e4b502e43d291ac9090cb521a98620e76bc344b50fcf385b543f758bda16cf38a9b8c907d163b1b6c5deec895492d1da71c55c04ca4fd945f3e86cf39fc6383b

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9x:C4Q2c94OtEvwDpj4H8zQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_9f73833d69317658cc984f1015ece06f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections