General

  • Target

    2024-02-03_323c085b8aa69369c11f6ee4f2f98fc0_cryptolocker

  • Size

    82KB

  • MD5

    323c085b8aa69369c11f6ee4f2f98fc0

  • SHA1

    c4d04281075a5e3446a2b0ab2e0011ca5551bf87

  • SHA256

    2a716df0aaf9c56449d10ac1437ffbc16e415eb1f1b9d1b2599c5608d001c1a0

  • SHA512

    74e480a81f96b54d30b7080159a2bca5ca27b4555ce39b91d69c020dd0f03f04cb7ff70fd6e4d50efa29d87bdc7009a50858377d121f81830f91a13891cabc8b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1x:zCsanOtEvwDpj7

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_323c085b8aa69369c11f6ee4f2f98fc0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections