General

  • Target

    2024-01-27_5290de6d3e70d5cbfb53d8c94078c8b8_cryptolocker

  • Size

    61KB

  • MD5

    5290de6d3e70d5cbfb53d8c94078c8b8

  • SHA1

    be5c8e2f3c73eeee0687c42042bd1c7748f7f707

  • SHA256

    b845d1c7805c81af6f036e36a57e9b1b4ed4570fa64c95002f721c2553914eb2

  • SHA512

    1b996c92ce4fab57da384a879655454fc3ccddebc8bbfb80cbd5b4c60cb89d984d59aebdd1a6150fa47d546f47d77595d18de873829acd4755a36eb62e8bf285

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo6m:1nK6a+qdOOtEvwDpjd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_5290de6d3e70d5cbfb53d8c94078c8b8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections