General

  • Target

    2024-01-29_a4861983f7c91bc28b9216ef79589b49_cryptolocker

  • Size

    80KB

  • MD5

    a4861983f7c91bc28b9216ef79589b49

  • SHA1

    e4b7df2773bde3c5875bd9ffcab3b15ffc2ba8fe

  • SHA256

    aea25743e5bffc2f02a1cc21cd84df96776a6b0ebd3147a82217ce1a259af268

  • SHA512

    51f4b2ae437fb731ada381f6f4686ea8b41796c74b26f090e1c83d361f46ff683f51905943e4627cebac861e1d9f33f9cb9b7e241085dbfdbd82f8f3cfca9ba6

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7WAw:T6a+rdOOtEvwDpjNM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_a4861983f7c91bc28b9216ef79589b49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections