General

  • Target

    2024-01-27_4c5c35ff63ed6db6f14f081b51e39b5f_cryptolocker

  • Size

    60KB

  • MD5

    4c5c35ff63ed6db6f14f081b51e39b5f

  • SHA1

    2f83fd71805f0a4a541555c856e64c93b5838072

  • SHA256

    d7761f8fe143a545bb57afc132de09ad4acd84cd6f068d20b20c7398387a7a3b

  • SHA512

    bd1e6c63792d284fc1aa7c4a19c49b8441e7163bd61bf26c9036d56137ee692f7aa4c5be3d17f8690b6d1c53da24a27a38fa103cfa76ae5e29f8bc2a20788bff

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gXIum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gXlmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_4c5c35ff63ed6db6f14f081b51e39b5f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections