General

  • Target

    2024-01-24_d552b3fb3d938bf1215ae36a61637671_cryptolocker

  • Size

    81KB

  • MD5

    d552b3fb3d938bf1215ae36a61637671

  • SHA1

    f5e57796f897a8d3bee6ff52ed2835d8c4579706

  • SHA256

    41a9ea505f631f0c14aa916f51d973f6da93d7f739325791512bfea25eaead9e

  • SHA512

    51decceef9c8e7e9967729c27daeab5165ac8a9e902d0a0c4bee8f3c1cbc944e84120b29b447937473816bb6dca26f8e0e16c63166d6ca79b007aef31edee2a9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vq:T6a+rdOOtEvwDpjNG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_d552b3fb3d938bf1215ae36a61637671_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections