General

  • Target

    2024-01-29_574b0172f7c9c1ee2c13643ec9f892ba_cryptolocker

  • Size

    75KB

  • MD5

    574b0172f7c9c1ee2c13643ec9f892ba

  • SHA1

    b2db598806e7dff33d9935663ee0bf17d93ae6ce

  • SHA256

    a661ce2af58cc462d5852071d1fb0af6287e5af78cb6118adf5735c3c627fae4

  • SHA512

    477740ae9534e7eae81b4a4492b645d9281de1e3c2682f24988357745bcb0f7b377045d40914498fa9dc51ad30956e75658b342fb460e0149786ab6d31dda24d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdP:T6a+rdOOtEvwDpjNtp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_574b0172f7c9c1ee2c13643ec9f892ba_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections