General

  • Target

    2024-01-23_251b7702d932fba707622d96ca3f3aea_cryptolocker

  • Size

    91KB

  • MD5

    251b7702d932fba707622d96ca3f3aea

  • SHA1

    db0ff695b0a3b506ba982712cb1fbbc4cdfb39d6

  • SHA256

    0b6cd7cc12f94c884bacf33582cf8f218927607619489c40ca619361b661bc01

  • SHA512

    95ad550aab21cf24166404c6da4ef295ad1f419f54c711740c52ae434ef53a498d5d2bbb21ef0279f4a6ae4b44fab9e7a28a1fd9449d92dd05b6b32af336512c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/t:zCsanOtEvwDpjBt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_251b7702d932fba707622d96ca3f3aea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections