General

  • Target

    2024-06-01_f4917001f4fbffede0a2dc5e1cab134d_cryptolocker

  • Size

    24KB

  • MD5

    f4917001f4fbffede0a2dc5e1cab134d

  • SHA1

    515fe3cca63d1fa208516780de9a5884776080e5

  • SHA256

    c72cae326f4b4661e5748e82760b64181b3f913e1b5798012bb4817b982b55be

  • SHA512

    452eb3ad9ea3c4845d6810da0a4d13ea129899d823390d18eada1ae6f9e134db4679f73ad4155bf56d1c51f8442334a3a2734f5e481b12a7b62984843d178c15

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBW:bVCPwFRo6CpwXFXSqQXfjAsmHBW

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_f4917001f4fbffede0a2dc5e1cab134d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections