General

  • Target

    2024-05-30_fa86c9e73e9e4663e06827655e4200bf_cryptolocker

  • Size

    21KB

  • MD5

    fa86c9e73e9e4663e06827655e4200bf

  • SHA1

    966b1128833a1c57a35442ffbf3550141d0516b9

  • SHA256

    c3f62a6aec1f9e115a8467af6fef81733f5b767db10904408e75a8f497cbe19f

  • SHA512

    8ca81513a46c5a1f89faafd49939e6bab445c2cd55c621485d7368da06de509696ab6d3fbf98216e86232d2bc8a7c2d47a27631ac98bc450a1817ae031a4d42a

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6k:bVCPwFRo6CpwXFXSqQXfjAk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_fa86c9e73e9e4663e06827655e4200bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections