General

  • Target

    2024-05-24_90c9db748568ac243bf412f45f081d55_cryptolocker

  • Size

    26KB

  • MD5

    90c9db748568ac243bf412f45f081d55

  • SHA1

    14cbc8011c27a74f90d582da353bbd5ee8414605

  • SHA256

    f945adcf0ecb2e4e024f575880806d376f850752e662acba4241f1196631841d

  • SHA512

    2050d4fdd016265059faa3ea2458f8f91bcc769b8580aeb1e9525296943ea3e85ec8b21699922b39c19b4176a04339eef66ddb74f292649f260bdeadf143ac55

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOy:bFgm5zusFUB2preAr+Ofjg0STX73Oy

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_90c9db748568ac243bf412f45f081d55_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections