General

  • Target

    2024-01-28_590e2da4164ee81ce7dc5a842db575f0_cryptolocker

  • Size

    97KB

  • MD5

    590e2da4164ee81ce7dc5a842db575f0

  • SHA1

    5405dd340af4572f1e8a095d5ff8c37f4c7379e6

  • SHA256

    0da93eab852bf111d37d4ad2679abd4100e70d7d88f5029cdbb568e32136ac70

  • SHA512

    04905ab2dfe56e8aedc7624a9b69b6818da2c0dffb4742e08675c602bd529ff7797eba1749d9d13baed57eb9d1d89a5e3b2e4f82f5bd7641071bf81e2f8971d4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQ/:zCsanOtEvwDpjQ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_590e2da4164ee81ce7dc5a842db575f0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections