General

  • Target

    2024-01-23_4921bd10da32eb662943ebb719200869_cryptolocker

  • Size

    74KB

  • MD5

    4921bd10da32eb662943ebb719200869

  • SHA1

    5f8596e6f9eaa055d2512606d6cb0dfd69c0cc1b

  • SHA256

    aae02b3a6e85be67a6f8fc5881e3ccafc8ef21e5fa7264f8d7b0db0515c97c1b

  • SHA512

    5871589e45275a48a2701c108a65065876ed18ef3a215fc24bf340033bcac2d2de690abe6113b0b80084f171fb79820fe486f9d5d85b6bf24c0e5f27f5440b4c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx47:T6a+rdOOtEvwDpjNtHPT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_4921bd10da32eb662943ebb719200869_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections