General

  • Target

    2024-01-27_5659400b7fc9233f0ac4937efea16f9f_cryptolocker

  • Size

    80KB

  • MD5

    5659400b7fc9233f0ac4937efea16f9f

  • SHA1

    e7734773994e512b3f231cf2686a5e1b21a4cc0e

  • SHA256

    98824a636666af20e390487921337232fbab03087b43d06a971a9e5ea469c3d0

  • SHA512

    6bbcba00d9d1c53175b8c0a909a4538fdcb11ae8b6b039e78a4dd5cde403a4bb30482940ecc9f90f6c18fb038b714eadef6166789439b9a6937e25dc8d7eed57

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2u:zCsanOtEvwDpj4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_5659400b7fc9233f0ac4937efea16f9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections