General

  • Target

    2024-01-24_920ad7024ca23da4df5fbc5d88eaac13_cryptolocker

  • Size

    81KB

  • MD5

    920ad7024ca23da4df5fbc5d88eaac13

  • SHA1

    2fc5eb00440fe3491672ab1fb1ff3c1bd9195be0

  • SHA256

    1f42f83f83b0795f898174a72f5f80f40a0b311d0df5a5d1e328bae34a6ee48e

  • SHA512

    49ad3cc2e0fba1ee6ca9d29de41484c8482d27b46e41d29973deeb7d8cbc1869acb988d7cd48f593bc48e5873af9cefb425a4a0b75924888e0a79e83d52ab1b9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7Ih:T6a+rdOOtEvwDpjNu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_920ad7024ca23da4df5fbc5d88eaac13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections