General

  • Target

    2024-05-29_c437f28016dc53080388027620f310e4_cryptolocker

  • Size

    24KB

  • MD5

    c437f28016dc53080388027620f310e4

  • SHA1

    1d207e3141af92c033c7e1d834d69e8eb667cce8

  • SHA256

    72a7da1b3b96c473a0edb642534f44d256d270db571518f494d36283c5adbba5

  • SHA512

    ac01185c704ac1fe1d4f89b4f18f230630293fd6300803d56d0c3a81fd5db933a519a3854a088544a2202fc852ab9f92e0c4eac3939449d9145083e20a9e6c8a

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJ2Ai:bVCPwFRo6CpwXFXSqQXfjAsJe

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_c437f28016dc53080388027620f310e4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections