General

  • Target

    2024-01-27_085cfb740dbf60e7f836ec045f43343f_cryptolocker

  • Size

    64KB

  • MD5

    085cfb740dbf60e7f836ec045f43343f

  • SHA1

    9ae37b8dbabaccce78430a377c8d3ed7c7a28222

  • SHA256

    81eb6135ccb6f0c15044be6b2a99a3570a887f2f5199e20e71d50f3210de231f

  • SHA512

    edabd41c0ee14650e1e375e79f9df1eeccf4a757bc53266068c21ac0dc482fdc0ea76593701b0b033603312ddf56ac8036a357c994e79f76c9384734230116f5

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+g1Sum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+g1LmddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_085cfb740dbf60e7f836ec045f43343f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections