General

  • Target

    2024-06-15_854644d3a0db3cb4314de0d70f0f2d23_cryptolocker

  • Size

    27KB

  • MD5

    854644d3a0db3cb4314de0d70f0f2d23

  • SHA1

    ad9ac8d2d363468f39a25382bf1448679c60071b

  • SHA256

    048d7d60deff20a84fbcd4e333db52de798c047c20b8259a3f687e1e10ef2bd3

  • SHA512

    fdba90af57dfb24f36063c61e3c5e9922fbe2747330b93e6eead5f7aeb14bbb9b18b4dcca24d14ec6a206823549eacec33d9104b95a896ac9b3dec47f361750d

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOB/:bFgm5zusFUB2preAr+Ofjg0STX73OB/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-15_854644d3a0db3cb4314de0d70f0f2d23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections