General

  • Target

    2024-05-28_44380f7eeaa8c1cc6c6e42ba964922ee_cryptolocker

  • Size

    34KB

  • MD5

    44380f7eeaa8c1cc6c6e42ba964922ee

  • SHA1

    4a49727c7056961d384949ff55359b882927a25f

  • SHA256

    ac15805690f9e3837dca1339fafc23195792b64402f4896284bd5e109920728f

  • SHA512

    39139298abe1a0cad5d7c766f8105cb71b68b79b8d779cfdcfba9af1a3537939e9a0f3d63877b531aa6b03e9aef645aec1bacdb1d4ea379e7f42f6b9d3f69cd1

  • SSDEEP

    768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtXI:bFPmpiif/oc+vXI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-28_44380f7eeaa8c1cc6c6e42ba964922ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections