General

  • Target

    2024-01-22_3778a14f76e9c5425572f89d14eabc14_cryptolocker

  • Size

    89KB

  • MD5

    3778a14f76e9c5425572f89d14eabc14

  • SHA1

    58b295292701d9e29e41249c1c471030445d6d94

  • SHA256

    1ac695ea9e3d595819ac96d9683b86c1f3d37d251da530f71c551205e9a96acb

  • SHA512

    17523a3d9c46ad86bba2d38b467965157b9e2a963cb7b526e1e9436d4841085db8d523ab899119ea61ff741c3fc2b12485a73450b2469beba72e362a984e4742

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87H:zCsanOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-22_3778a14f76e9c5425572f89d14eabc14_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections