General

  • Target

    2024-01-23_50432bb4b4446abcbb372260f57a2cbf_cryptolocker

  • Size

    74KB

  • MD5

    50432bb4b4446abcbb372260f57a2cbf

  • SHA1

    924706c8833dc63827411c807266d1d25ed534cd

  • SHA256

    b8c75254e3f1c322bdaa19ea031a9b252f5659d5c9e0d410aec8c7735e2840e4

  • SHA512

    9e6c5b260e9a08eabc21476dc105575b33bbddf2c0ed1db148ed1ee95616b5726470ae8869afdb54bccb730d78f138467a47d6855f1f827a64eca96134cca529

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxo:T6a+rdOOtEvwDpjNtHPn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_50432bb4b4446abcbb372260f57a2cbf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections