General

  • Target

    2024-06-13_fee1967187cb3f9fd9f9052ecc04880e_cryptolocker

  • Size

    73KB

  • MD5

    fee1967187cb3f9fd9f9052ecc04880e

  • SHA1

    379f2fd41b93348bb8a8024a9923f936d16e5c0a

  • SHA256

    9a3ddc1b6ed8f207eef5bc18454645bcbcd6f30721871c68059468edd2236a09

  • SHA512

    187a0f07345c156578bde0694a86d53d4c751a67c25df278bc88cb6faa213d7175316bf7c8a4a100a3183b26cd3c3254b15f428769b0872746f9b8dbe4e7b74b

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs973d:C4Q2c94OtEvwDpj4H8zI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_fee1967187cb3f9fd9f9052ecc04880e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections