General

  • Target

    2024-01-18_51f345161ab2bd7c4df4a6a315bc5f36_cryptolocker

  • Size

    93KB

  • MD5

    51f345161ab2bd7c4df4a6a315bc5f36

  • SHA1

    24451a3f41af1f654017b255c90cbe1d9f98c53d

  • SHA256

    fb781b33d03494db892e4e9bfd476c3718b01f1d72b77cf6e1dfd6249d7b20e5

  • SHA512

    464a79635bbdba306a52eefa73e893d5a245bee8c5e4d2b687fdb84cc7226ec1f7cbfe356bcd728074a72c100a87cb3b8718c8fa185a769c2c1f13cebb201e59

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RRv:zCsanOtEvwDpjm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_51f345161ab2bd7c4df4a6a315bc5f36_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections