General

  • Target

    2024-02-01_3565597e9a8ddf5868d9d3e7e0188d4c_cryptolocker

  • Size

    105KB

  • MD5

    3565597e9a8ddf5868d9d3e7e0188d4c

  • SHA1

    0982e333614265c23e56de9ebc0d1887315493fc

  • SHA256

    05418d7794dcf60568f9d4ee464d15e1f063fde642a5bbde1dd91a628085e574

  • SHA512

    57df44f3b7157ecea0f3f17319f3f679123c0b7576eaf573128c88e5c0ee7d17520cd819696c95c0d5f9ab22ece9a571fc956db8dc6c7b4632f0bcbe96288e20

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkslR:1nK6a+qdOOtEvwDpjr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_3565597e9a8ddf5868d9d3e7e0188d4c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections