General

  • Target

    2024-06-11_e61e9e6dd6407d657623c6dbad9dd52c_cryptolocker

  • Size

    27KB

  • MD5

    e61e9e6dd6407d657623c6dbad9dd52c

  • SHA1

    997c56e0f5c0e49a1c149a9a8a137dbbf96e28a0

  • SHA256

    c8652c180c041948fc82b67835b2f354ed4c8fd0df006ecbad33e616763aa852

  • SHA512

    0aadf0a3c038d2863376725735e204e4bad752c2c708eadb88393b542a2d22ce4e2e7b69ccbf14475ce06b6e225854af27c35492f57b54a361562e96c20b93a1

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOBqA:bFgm5zusFUB2preAr+Ofjg0STX73OBqA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_e61e9e6dd6407d657623c6dbad9dd52c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections