General

  • Target

    2024-02-02_557e7518d097699ee294cddcead26e9c_cryptolocker

  • Size

    116KB

  • MD5

    557e7518d097699ee294cddcead26e9c

  • SHA1

    68530ed95876008a7410bf93a2cbc0f69debb8fe

  • SHA256

    d67aea245f6167100553523e0713c07ed4384570d50081d8e7a7ffdea3df0e89

  • SHA512

    ad41da3b172340d129ada211bf663478b9bbf28011f4adff546405b0f74eafcd2caac33d7c3939fa6ff9db25aabd9eeb59f94753323a95bfa23a32a2c5275d24

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01W:z6a+CdOOtEvwDpjczI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_557e7518d097699ee294cddcead26e9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections