General

  • Target

    2024-06-01_ade3cb4e614360ae4d6de4169e2e0b12_cryptolocker

  • Size

    24KB

  • MD5

    ade3cb4e614360ae4d6de4169e2e0b12

  • SHA1

    f5c01f87d4fd5f39e192e1bfe340722935367c10

  • SHA256

    8155784d18d4cde6487d47bd71beef4a8bc83be716abd93e7d557edea1e54cf5

  • SHA512

    bb210a4868a36667f6be3718d3d95072a7bcdcc4c999e0d6512e65d320c4a1395066c98fb4682eae3d81ceed64f83a9e23f19146b70c70d3b3f1de496ae37e11

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJN:bVCPwFRo6CpwXFXSqQXfjAsJN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_ade3cb4e614360ae4d6de4169e2e0b12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections