General

  • Target

    2024-01-23_40f594ca930dcc6c027fd620a9d7ccae_cryptolocker

  • Size

    92KB

  • MD5

    40f594ca930dcc6c027fd620a9d7ccae

  • SHA1

    ed068b3a9c88e4cda156794538d756fae240bae5

  • SHA256

    2d54bb8373f82540a45e8ebebc54bff4bd238a45321110b46cb3e04b193cfa9f

  • SHA512

    aff7d45edd262a04c18d23f605d7cec991ca5e2b91c19258dc4eb9ca7fab148a8d73c31676b0c15985bd4ee60c678689bc3d7667ce758a3ed757c6db7d6b211d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RRh:zCsanOtEvwDpj8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_40f594ca930dcc6c027fd620a9d7ccae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections