General

  • Target

    2024-01-26_522a6801ca04da1c269cc679bbfc963c_cryptolocker

  • Size

    61KB

  • MD5

    522a6801ca04da1c269cc679bbfc963c

  • SHA1

    1009cde59ff8c2fcadb835f5cf237238de70efe9

  • SHA256

    5fc2d39c3766c3f2ebd6671b160ec259328c6c93b20ea99e948f3dbcf9bcee91

  • SHA512

    5100f38b22eea680a7e9f4ddf3727220c78eeb9b9477bdbcb1a58f282a7bc276fb3e69adb1aa662ce35e7c05c6a81f59e8de40c080239c79155a1537159741ff

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoB:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-26_522a6801ca04da1c269cc679bbfc963c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections