General

  • Target

    2024-01-28_c39d0549e1a6fd5a8e4107393b1bb0bf_cryptolocker

  • Size

    81KB

  • MD5

    c39d0549e1a6fd5a8e4107393b1bb0bf

  • SHA1

    b76a74d356b33c599b478605689488047597af04

  • SHA256

    d4a4fe7b253d4c2aa4cf274beec375406e14e58da7002e2f710edc2b2d777a16

  • SHA512

    50584152081db8962eb4dec4027107c41d93faacbfe57a5bcf9606d3819a310425c7fd592d1113074864856f0c37bd4ef4ec127f3e50411fbb5c9c14e8de2e98

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdefD:T6a+rdOOtEvwDpjNtK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_c39d0549e1a6fd5a8e4107393b1bb0bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections