General

  • Target

    2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker

  • Size

    24KB

  • MD5

    9d0a2f749759db1384ceb39e90785f0f

  • SHA1

    d3f0e753a92f91910a2faa9bc6d96ebcb8c89871

  • SHA256

    d13e403c9344d4de6fe9c1815e3880013b0e81d0b9fdee914c0459492f3c025c

  • SHA512

    19cfa8127b3aa665acb5ef73b2fad200e4d65d2c08113b0da82a00373aa1012658468851357b7690950d0149a2e640b6ec08d0b1c57f87f787daa88680fe06cc

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHB/:bVCPwFRo6CpwXFXSqQXfjAsmHB/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_9d0a2f749759db1384ceb39e90785f0f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections