General

  • Target

    2024-01-23_98d1559fb5218c24f8cc14c7e2081f30_cryptolocker

  • Size

    60KB

  • MD5

    98d1559fb5218c24f8cc14c7e2081f30

  • SHA1

    6e36273d05807fcbdd56445ef2ed245f3dd815eb

  • SHA256

    cbc733a140d46269b6581258c978e9bf0886f038a3d46dcc23a67788d49b11ca

  • SHA512

    15c03b51d252bff7a427380c3a73ede3c9028ae1745ab42671244043edbc44b979b339ed8197f43c3fc92eb1e7c440fa880163d07f8006203dd0d7a30389fe73

  • SSDEEP

    768:qImnjO6LsoEEeegiZPvEhHSG+g0zum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+g0KmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_98d1559fb5218c24f8cc14c7e2081f30_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections