General

  • Target

    2024-01-25_0404b1d253fc6c6f7cd29a333dd88948_cryptolocker

  • Size

    96KB

  • MD5

    0404b1d253fc6c6f7cd29a333dd88948

  • SHA1

    f86ff214f6e69e1f4ee7f9814ebd32cb16b847c8

  • SHA256

    e7377a006406740a2e7cef5ecc0dd2adb3bd4e17f11ad863fc4446fee07e8b52

  • SHA512

    e36f22a5a113571ffefe2d18a01a7d8943233c8ce646f310f8215fc0814f6536cbc5d382af3a0723c9f3766f4ec0ceef8224f6c5ef26f056dd12fb9265db430f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQva:zCsanOtEvwDpjp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-25_0404b1d253fc6c6f7cd29a333dd88948_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections