General

  • Target

    2024-01-29_a455a5ac2b42e1429ef1b7973bd05577_cryptolocker

  • Size

    67KB

  • MD5

    a455a5ac2b42e1429ef1b7973bd05577

  • SHA1

    a065b7e52f98d15552feac488a3f60751aa7159b

  • SHA256

    ca7bb1f83deeb3c41ab7ea18bcb45ff917a31a94936da9ea0d83fa283b6acdd9

  • SHA512

    b4526aa87d02055e5dd7e02e7401ab779307ab2173e117515e024dd5917540d83534b84f8bbdb8bcb7cbd1d6d120964e4bab22074ad7e30650f7f674d4792854

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBdN:z6a+CdOOtEvwDpjQt

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_a455a5ac2b42e1429ef1b7973bd05577_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections