General

  • Target

    2024-01-24_b432a3415da524b1e705f4d58bc59f9a_cryptolocker

  • Size

    56KB

  • MD5

    b432a3415da524b1e705f4d58bc59f9a

  • SHA1

    c8c558a20b9f7a5bca3135eb8b8a5ee482771956

  • SHA256

    a6e431089002183bf25ff947de120ddd41f3a629d561dfc4bb82deb3ba55d17b

  • SHA512

    e6a77348f9089a1170e190a3a5aae910eaf1ced860d17f4e305ace10e2660a674fe3b240cef615e63927007a5786509dcde0f4d20911324d499a8da1bf662198

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLzbK:zj+soPSMOtEvwDpj4yzbK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_b432a3415da524b1e705f4d58bc59f9a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections