General

  • Target

    2024-06-12_3399ab5380298dfe4fe189005e06e02f_cryptolocker

  • Size

    35KB

  • MD5

    3399ab5380298dfe4fe189005e06e02f

  • SHA1

    5800a6f8387747e90ca57ac89e239de0aa67e1dc

  • SHA256

    fafec74892b8cebd7b888b99209e7311b5fba11e2d8440907d5c64c21ef0218d

  • SHA512

    49206b18823e79872747cac2766118897fb6a561722cd283b30b130f87098aa695a0657f144167d1b313a143759c663e8c40a4a830ab33835fe620df82babeb3

  • SSDEEP

    768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtXT:bFPmpiif/oc+vXT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_3399ab5380298dfe4fe189005e06e02f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections