General

  • Target

    2024-01-18_4c5939c2f067524964e0944965139baf_cryptolocker

  • Size

    105KB

  • MD5

    4c5939c2f067524964e0944965139baf

  • SHA1

    628b59904e22bdd22b4a3519ef16ac6738f52faa

  • SHA256

    bf507ffb67e5b88e7a85e99e1dafe60ee09e41a6b3c03f31c98354d94d6c18c2

  • SHA512

    55fa3a4f416be81f7064a3b34003eeb39d7ff33fc8582b654be4b678cccf0c29fc306c90b35bb8740303dd004c4219f358aa130efda848da5bbb5b212cf7c2d7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksC:1nK6a+qdOOtEvwDpjC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_4c5939c2f067524964e0944965139baf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections