General

  • Target

    2024-01-18_40ccf6931e4dbda6db73091799dc3986_cryptolocker

  • Size

    67KB

  • MD5

    40ccf6931e4dbda6db73091799dc3986

  • SHA1

    f4afbf212f955f4cb7652fba0d69f6139b8b87b6

  • SHA256

    4f54b6b604e58ce771c1f47a6b6188a5065ecf8367e01c23d687c3740c96a9ed

  • SHA512

    87bd9720d0b746cfdf9a1b6392453c06f4f380dd2d39c9dfcfc3825d354e76e293cb9802c10577c0ebbd4d2493fb005d63d5078698bd91a51f33afacdbd9280e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvCbDa6Je:z6a+CdOOtEvwDpjQH8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_40ccf6931e4dbda6db73091799dc3986_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections