General

  • Target

    2024-01-25_4bfa6f2cdb29c6516ff728b3f4fe552c_cryptolocker

  • Size

    97KB

  • MD5

    4bfa6f2cdb29c6516ff728b3f4fe552c

  • SHA1

    39de9a5ca732e55096dd1955522d08f40b67fd71

  • SHA256

    a92a8661305140b3e21d3c70b2dbbe267b5831e060401cf1b326218391c1d34d

  • SHA512

    dd05eb6a1aceec73cd6547e445dc7c21f84fcf3209f3e89085b0a83fc9c71054896991d07568215af8f4789768932ec990345400252545a47c9cac78962b1eab

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQW:zCsanOtEvwDpjt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-25_4bfa6f2cdb29c6516ff728b3f4fe552c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections