General

  • Target

    2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker

  • Size

    60KB

  • MD5

    c20de4e81b1f8ab996d0b4e0451cbd45

  • SHA1

    6befd0e7fc0c6d8ea9ef92c321050878e9665097

  • SHA256

    f4d97d0fcad44173f4e4bb8b6dfcab179a6d99ab4e4bd2fcd2419af5c472bfe0

  • SHA512

    1a5a56717ccf3c6d0642942594218dd21c80ae77ea0a34221637d47c2aeded33a105295d8ce6b660aa66150e8fd2ac9a4dcc7181958cbe7e16ef10b68505f617

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAuZv:z6a+CdOOtEvwDpjQz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections