General

  • Target

    2024-01-27_63c1487e52927d94eb347ed7997fc17d_cryptolocker

  • Size

    61KB

  • MD5

    63c1487e52927d94eb347ed7997fc17d

  • SHA1

    d44204a8feade386557e771f701428fceeaa3f5d

  • SHA256

    49918ec1296c2e7a419717ff45debba2f9ba402e3e13a7abf538a60265c7cfc3

  • SHA512

    7b518a7db9e6934b44c02049e2571de3cca2798f50ef6fa7b1d860b5aa369dd48ce49f13e4a0cee155d85580d3e1380f1ed6e6006abbf9f024b401e72a8c5d73

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVq:zj+soPSMOtEvwDpj4kpmeLmnE

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_63c1487e52927d94eb347ed7997fc17d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections