General

  • Target

    2024-01-28_8e950e45324172fbb911a4beba07ba33_cryptolocker

  • Size

    60KB

  • MD5

    8e950e45324172fbb911a4beba07ba33

  • SHA1

    10dbc9df1e8b997dd6ff5c8e721d903b398bc02d

  • SHA256

    51e0b9db60774e347b4124099ce0a3fb0537eb525e3b76fd095a5470457ce720

  • SHA512

    655eee11f5f96d34178860423ff380c32b56a006d593bcfaa34a7fb491a89972b1d638f165cc9a1f1217edcb7ecd6e6b840af4d51799de0030d1e7c90ee4a453

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVW:zj+soPSMOtEvwDpj4kpmeLmnA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_8e950e45324172fbb911a4beba07ba33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections