General

  • Target

    2024-01-23_23e759bb702e707fec1d503164fcddfc_cryptolocker

  • Size

    64KB

  • MD5

    23e759bb702e707fec1d503164fcddfc

  • SHA1

    1f8edd53544cf9662d82f7902bf09e7dad473bf2

  • SHA256

    599781237cec1bda625608eb92a8be009a80b4cabed5e14e9e829a32b66963b9

  • SHA512

    f3e65b2ba20dded034b6d87b235be13d6bd162b65fa6ba60d2d4fb52db692d822e780ef4b8e00a1d51a26da4156be387fe88b8eb83e4390361e31a6b84095226

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gXUum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gXhmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_23e759bb702e707fec1d503164fcddfc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections