General

  • Target

    2024-01-24_377f80bae2d90b46626b852c8e62aa2c_cryptolocker

  • Size

    96KB

  • MD5

    377f80bae2d90b46626b852c8e62aa2c

  • SHA1

    c08e3bc0a2696dad2af989a2d6f964374c8f6489

  • SHA256

    95b63e1e815ed80eaff49b542ed651829443114eeb1ab493fa700b872d65c69d

  • SHA512

    e0a6678f9c35a85ee7740bf6a8fb4a16a393725e25eb95dc13af36ae8d56249dd0ce0620e3c94f8474ba506a549376ad6c601515872425ad4bf05136ef728f0c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BE:z6a+CdOOtEvwDpjcC

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_377f80bae2d90b46626b852c8e62aa2c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections