General

  • Target

    2024-01-23_c51baee38ccf4b3e3ca9eb741f500d8f_cryptolocker

  • Size

    61KB

  • MD5

    c51baee38ccf4b3e3ca9eb741f500d8f

  • SHA1

    8a94085efd829a47f2a46353d73e715bf6873c9c

  • SHA256

    2b78de69a85c839e24ef89b5c7aba7d78a8be937a3b10c9aa40376262e7b7c20

  • SHA512

    9ad45bdd0f25a89e5a0adfc2b782124084eea7aca4920285d4a32cdb44cb0ce66ac297a69e7d1f6df5453e672589ea892261542b992cb61c3bb260d521916b33

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVm:zj+soPSMOtEvwDpj4kpmeLmnw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_c51baee38ccf4b3e3ca9eb741f500d8f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections