General

  • Target

    2024-02-01_a6a1012437a71f2e53e3735b40a1be8f_cryptolocker

  • Size

    86KB

  • MD5

    a6a1012437a71f2e53e3735b40a1be8f

  • SHA1

    cc2b511e5196253b3b14fc49215aeebcb0cf7aba

  • SHA256

    875b866bd5d1206c5a5bdf188d33bf83492538352b03f702dae735d3d4346fc7

  • SHA512

    ccb54c98a7c8ebe0ac4f3075fa2d166339c7ff733d666191281ac9f97a5c99b68a6d5724ac81cee4134dee13376b61e417e9ef0a17037774dcc5a6793971d748

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8Z:zCsanOtEvwDpjd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_a6a1012437a71f2e53e3735b40a1be8f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections