General

  • Target

    2024-01-27_043a3004bc71f02068a0c687ff62d702_cryptolocker

  • Size

    115KB

  • MD5

    043a3004bc71f02068a0c687ff62d702

  • SHA1

    2472e0836b8daa780e627636102d03bc1c55420c

  • SHA256

    ee988ed8c96e02ec2558a0198087b3b3870dd2912437b0c896d532db38841ff3

  • SHA512

    f9cab2fb4ca9b93c73f5e8059aa6a28cb2f4ada5a7711fe81be4ecf035846b31470d3e171afee81f4318098a21c94dcab4a1d8c48ac164b15190b3596765043d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp017:z6a+CdOOtEvwDpjczp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_043a3004bc71f02068a0c687ff62d702_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections