General

  • Target

    2024-01-23_67a22ae94082a5e826a1eb54d72b6120_cryptolocker

  • Size

    61KB

  • MD5

    67a22ae94082a5e826a1eb54d72b6120

  • SHA1

    632df467e229128596da6fce36abf2358b823db9

  • SHA256

    b587f596d8fdff0785f50b805cd5a16c39abe15d7713a95a558c7cbd23d378bb

  • SHA512

    164ba412ed9fe3dbb9dd205a2eda6c4dff1484dd82f342b51c331e565ce610c9c9646efbab8a503849bd67df40682a7d9f113ef56b3cebcf1766bea648aa3f8f

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnV2:zj+soPSMOtEvwDpj4kpmeLmnw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_67a22ae94082a5e826a1eb54d72b6120_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections